Security News > 2022 > May > How to eliminate the weak link in public cloud-based multi-party computation
Regardless of how centralized or distributed, the weak link appears when private keys or other MPC components must be computationally executed on a CPU. The point of the encryption protocols is that the algorithm is public, and the security relies only on the keys.
If an attacker infiltrates multiple hosts, and gains access to the required pieces, they can perform the multi-party computation on their own and steal digital assets and funds.
Attackers have the potential to observe computation, capturing keys and interfering with transactions.
These attackers may be rogue insiders, third-party contractors or attackers that have gained root access to servers.
Sometimes access can come through an insecure software component in cloud or application infrastructure, which can then be used by an external attacker or insider.
Private keys can be made totally opaque to attackers.
News URL
https://www.helpnetsecurity.com/2022/05/27/multi-party-computation/
Related news
- Multi-cloud Strategies Making DDI and DNS Cumbersome to Manage (source)
- 5 Steps to Boost Detection and Response in a Multi-Layered Cloud (source)
- Google Cloud to Enforce Multi-Factor Authentication by 2025 for All Users (source)
- IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools (source)
- Strategies for CISOs navigating hybrid and multi-cloud security (source)
- Enhancing visibility for better security in multi-cloud and hybrid environments (source)