Главная
Study mode:
on
1
Introduction
2
Usage Example
3
Reservation Provider Priority
4
Pointer to Memory
5
Key Copy
6
Hardware Protected Keys
7
IBM
8
How it works
9
Security
10
More details
11
Conclusion
12
QA
Description:
Explore the hidden feature of the Linux Crypto API that enables cryptographic operations with hardware-protected keys in this conference talk. Delve into the intricacies of this under-documented mechanism, introduced by IBM for s390 mainframes and later adapted for embedded systems. Learn how this feature can enhance security for secret keys, especially in the face of speculative execution side channel attacks. Discover how to determine if your system supports this capability, understand its usage, and navigate potential challenges. Gain insights into the feature's depth, its security implications, and its practical applications through detailed explanations and examples.

Using Hardware Protected Keys with the Linux Crypto API

Linux Foundation
Add to list
0:00 / 0:00