Cryptographic Computing: Protecting Data in Use - AWS Online Tech Talks

Поделиться
HTML-код
  • Опубликовано: 21 дек 2024

Комментарии •

  • @billguschwan4112
    @billguschwan4112 Год назад

    Great overview of 3 phases of data encryption and then deep dive into one solution for date in use!

  • @stantkatchenko1341
    @stantkatchenko1341 Год назад

    Really cool and something I didn't know ... Thanks a lot.. Tiny, little thing.. if memory does not fail me, HMAC assumes that both parties have symmetric key. One is added to the message before hashing. Security freaks like me would be interested in key exchange details.. Some algorithms may not be good enough

    • @awssupport
      @awssupport Год назад

      I appreciate your insights, Stan! We'd welcome a better understanding of your use case to look into this. Please share more details as mentioned here: go.aws/feedback. ^ES