Artwork
iconShare
 
Manage episode 513308563 series 3695172
Content provided by Maitt Saiwyer. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Maitt Saiwyer or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

This episode focuses on the immense, often-overlooked logistical challenge of maintaining security and achieving crypto-agility across trillions of interconnected systems, even without a catastrophic future threat. The foundations of digital trust were revolutionized by Public Key Cryptography (PKC), with RSA becoming the initial standard for encryption and Diffie-Hellman (DH) being key for establishing shared secret keys. Modern ciphers like Elliptic Curve Cryptography (ECC), however, offer similar security with much smaller key sizes, leading to faster calculations and less overhead, making them ideal for constrained environments. Regardless of the scheme, the security of any cryptographic system is only as strong as its key generation process, as shown by historical examples where basic programming errors led to easily predictable keys and complete system compromise.

The difficulty of implementing security extends to the organizational and engineering level, often dwarfing the purely technical challenges. The historical transition from the Data Encryption Standard (DES) to Triple DES (3DES) illustrates this: even though the underlying DES algorithm was not mathematically broken, the short 56-bit key was made vulnerable by increasing computer power. The resulting upgrade to 3DES—running DES three times with two or three distinct keys—was a complex, multi-year, multi-billion dollar logistical effort, highlighting the massive inertia in large systems. This inertia is why achieving crypto-agility—the ability to swap out old algorithms or keys—is so difficult and why migration efforts are often delayed or compromised.

Migrating or securing legacy systems is further complicated by implementation flaws and the difficulty of secure key destruction. Even after an application overwrites a key, the operating system's memory management may have already made hidden copies in swap files or disk caches, requiring specialized erasure tools for true security. In the context of large-scale infrastructure like the smart grid, organizations face a perpetual vendor risk, as security cannot be easily retrofitted, meaning the entire system's agility depends on the security and patching cadence of every third-party component. This requires organizational leaders to adopt rigorous processes, such as using checklists to enforce critical steps and objective risk management that quantifies the probability and potential cost of systemic failures.

  continue reading

18 episodes