Cryptographic Key Management APIs

Most developers use cryptography via an Application Program Interface (API) either to a software library or a hardware device where keys are stored and all cryptographic operations take place. Designing such interfaces so that they offer flexible functionality but cannot be abused to reveal keys or secrets has proved to be extremely difficult, with a number of published vulnerabilities in widely-used crypto APIs appearing over the last decade.

Provided by: SecurityTube.net Topic: Security Date Added: Mar 2013 Format: Webcast

Find By Topic