Upload
steve-markey
View
67
Download
0
Embed Size (px)
Citation preview
Crypto v2.0
Steven C. Markey, MSIS, PMP, CISSP, CIPP/US , CISM, CISA, STS-EV, CCSK, Cloud +
Principal, nControl, LLCAdjunct Professor
• Presentation Overview– Security Challenges– Technical Solutions = Opportunity
• Homomorphic Encryption (HE)• Stateless Tokenization
– Real-world Deployments
Crypto v2.0
Crypto v2.0• Security Challenges
– New Technology Paradigms• Digital Currencies• Big Data
– Legacy Crypto Exists – MD5, AES 128• Big Data May Cover Multiple Crypto Deployments• BitCoin, etc. relies on ECC
– Attack Vectors• (Sensitive) Data Compromise• Wallet &/or Key Compromise
– Single (Location) Point of Failure
• Lack of Backups
Source: Flickr
Crypto v2.0
• Technical Solutions– (HE)– Stateless Tokenization
Crypto v2.0
+ =
Crypto v2.0
Crypto v2.0
Crypto v2.0
Source: thonky.com
Crypto v2.0
• HE vs Multisig– HE = Parse & Match Key Values
• Keys Can Be Lost• Allows for Arbitrage
– 3rd Parties May Be Hacked – Not an issue for Colored Coins
– Multisig = N-to-1 Address to Key Association• Addresses Can Be Spoofed• Addresses Are Easier to Determine• Allows for Arbitrage
Crypto v2.0
Crypto v2.0
Securing Big Data
Crypto v2.0
Crypto v2.0
Crypto v2.0
Crypto v2.0
Crypto v2.0
Crypto v2.0
Crypto v2.0
• Presentation Take-Aways– Big Data & Digital Currencies Are Here to Stay– They Have to be Secured
–Data–Keys–Objects
Crypto v2.0
• Questions?• Contact
– Email: [email protected]– Twitter: markes1– LI: http://www.linkedin.com/in/smarkey