The trust in a computing platform’s operation is established during its power-up, when essential components such as the operating system and critical parameters are loaded. If this power-up sequence – also known as boot sequence – is not secured, the entire computing platform may be compromised.
Correct use of agile, hardware-based cryptography can secure the power-up process. In an age where advanced attacks against critical information at rest can exploit vulnerabilities in the computing platform, crypto-agility has become a vital defense mechanism. Moreover, as quantum technologies evolve, it is critical to integrate Post-Quantum Cryptography (PQC) into cryptographic implementations already today.
This webinar reviews how hardware-based cryptographic mechanisms can be used to secure the boot process of a computing platform. We will discover how the confidentiality, integrity, and authenticity of the boot process can be secured with post-quantum secure boot.
Ещё видео!