Chapter 6
Cryptography key management is the most critical objective for any organizations. Employees uses Hardware Security Modules (HSMs) for signing lower volume of documents or code, authenticating to VPNs or any other network. HSM can also API and can support automated workflow. Secondly, Physically Unclonable Function (PUF) technology has been a paradigm shift in key protection. With this technology, keys can directly be derived from unique physical properties of the chip's SRAM memory.
Guardtime, a software security company based in Amsterdam, has come up with Keyless Signature Infrastructure (KSI) technology to transform PKI. KSI technology uses hash-function cryptography, allowing to rely only on the security of hash-functions using blockchain.