Ever wondered how systems look from an attacker's point-of-view? In our "How NOT to..." videos we explore how systems can be exploited - and how we can counter that with good engineering practices.
Cryptography becomes increasingly relevant in connected devices. However, to use cryptography on the device, secret cryptographic keys are often required and have to be stored somewhere. In many cases, dedicated solutions to store secrets seem costly and it is unclear if they are actually needed. After all, if the secret is hidden well enough, the attacker might be discouraged from trying to extract it. But how good can secrets actually be hidden? In this video, we aim to give you a better idea of the effort that it takes to extract a secret that is hidden in binary data.
We want to produce videos that cover the topics most interesting to you. So do not hesitate to use the comment function and tell us which topics you would like to be covered.
Get in touch with us:
► Via Website: www.itk-engineering.de/expertise/cyber-security/
► Via E-Mail: security-projects@itk-engineering.de
You want to know more about the person from the video? Click here to go to the LinkedIn profile: www.linkedin.com/in/jens-k%C3%B6hler-22abba143/
コメント