Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Slide 12 Slide 13 Slide 14 Product List
Slide6
While TLS is marginally sufficient for banking and internet web browser security, it is not sufficient for the new age of devices and IoT. Mutual authentication is in the TLS specification, but it is optional and typically only done one way, if at all. Usually only the server is authenticated. When logging in through a PC it was only important for the server to be authenticated because the user (client) would authenticate themselves with the web application in the application layer. In today’s age of IoT, the identity of the device now becomes important. This is not currently addressed in a meaningful way with the software-only TLS implementation. In addition, key storage is done in the software. Therefore, sensitive information such as private keys and certificates are susceptible to compromise in a number of different ways. With TLS, the communications in the network layer are open at the end points. These communications are decrypted at the server, which can be a potential attack point if the server is compromised.
PTM Published on: 2016-09-30