YoVDO

Using Hardware Protected Keys with the Linux Crypto API

Offered By: Linux Foundation via YouTube

Tags

Linux Courses Cryptography Courses Embedded Systems Courses Hardware Security Courses Side Channel Attacks Courses Key Management Courses Security Engineering Courses Speculative Execution Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the hidden feature of the Linux Crypto API that enables cryptographic operations with hardware-protected keys in this conference talk. Delve into the intricacies of this under-documented mechanism, introduced by IBM for s390 mainframes and later adapted for embedded systems. Learn how this feature can enhance security for secret keys, especially in the face of speculative execution side channel attacks. Discover how to determine if your system supports this capability, understand its usage, and navigate potential challenges. Gain insights into the feature's depth, its security implications, and its practical applications through detailed explanations and examples.

Syllabus

Introduction
Usage Example
Reservation Provider Priority
Pointer to Memory
Key Copy
Hardware Protected Keys
IBM
How it works
Security
More details
Conclusion
QA


Taught by

Linux Foundation

Tags

Related Courses

Introduction to Linux
Linux Foundation via edX
操作系统原理(Operating Systems)
Peking University via Coursera
Internet of Things: Setting Up Your DragonBoard™ Development Platform
University of California, San Diego via Coursera
Information Security-3
Indian Institute of Technology Madras via Swayam
Introduction to Embedded Systems Software and Development Environments
University of Colorado Boulder via Coursera