skip to Main Content
bitcoin
Bitcoin (BTC) $ 96,735.92 1.23%
ethereum
Ethereum (ETH) $ 3,411.75 1.29%
tether
Tether (USDT) $ 0.999678 0.12%
xrp
XRP (XRP) $ 2.20 0.65%
bnb
BNB (BNB) $ 705.25 1.29%
solana
Solana (SOL) $ 190.88 0.67%
dogecoin
Dogecoin (DOGE) $ 0.320608 1.03%
usd-coin
USDC (USDC) $ 1.00 0.13%
staked-ether
Lido Staked Ether (STETH) $ 3,407.38 1.30%
cardano
Cardano (ADA) $ 0.903385 3.59%

Secure Encryption Key Management Modules, Explained

You must confirm the subscription in your inbox.”,”subscribe_email_required”:”Email required”,”subscribe_email_invalid”:”A valid email address must be provided. “,”shares”:”Total shares”,”views”:”Total views”,”sponsoredBadge”:”stretch_banners.sponsored.badge”}” :post=”{“id”:40377,”seo_title”:”Secure Encryption Key Management Modules, Explained | Cointelegraph”,”seo_description”:”The encryption process generates cryptographic keys that are used to lock (encrypt) and unlock (decrypt) data. There are two forms of encryption keys: symmetric…”,”keywords”:”Blockchain,Cryptocurrencies,Security,Private Key,Cryptography,Encryption”,”canonical”:”https://cointelegraph.com/explained/secure-encryption-key-management-modules-explained”,”thumb”:”https://images.cointelegraph.com/images/1024_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy85NjBmYTU3NGM5ZmY0OTMzYzhjNDgxNzQzMmIyMzVkZS5qcGc=.jpg”,”img”:”https://images.cointelegraph.com/images/2048_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy85NjBmYTU3NGM5ZmY0OTMzYzhjNDgxNzQzMmIyMzVkZS5qcGc=.jpg”,”youtube”:””,”og_title”:”Secure Encryption Key Management Modules, Explained”,”og_description”:”The encryption process generates cryptographic keys that are used to lock (encrypt) and unlock (decrypt) data. There are two forms of encryption keys: symmetric and asymmetric.”,”twitter_title”:”Secure Encryption Key Management Modules, Explained”,”twitter_description”:”The encryption process generates cryptographic keys that are used to lock (encrypt) and unlock (decrypt) data. There are two forms of encryption keys: symmetric and asymmetric.”,”published”:”2020-02-28T17:20:00+00:00″,”noindex”:0,”modified”:”2020-02-28T17:41:46+00:00″,”title”:”Secure Encryption Key Management Modules, Explained”,”leadtext”:”The encryption process generates cryptographic keys that are used to lock (encrypt) and unlock (decrypt) data. There are two forms of encryption keys: symmetric and asymmetric.”,”amp”:”https://cointelegraph.com/explained/secure-encryption-key-management-modules-explained/amp”,”alternates”:[],”alternatesLinks”:[],”url”:”secure-encryption-key-management-modules-explained”,”url_full”:”/explained/secure-encryption-key-management-modules-explained”,”category”:{“id”:65,”url”:”explained”,”priority”:0,”created”:null,”modified”:null,”parent_id”:0,”is_hidden”:0,”created_at”:”-0001-11-30 00:00:00″,”updated_at”:”2019-03-12 14:52:37″,”deleted_at”:null,”admin_weight”:30,”enabled”:1,”is_blog”:0,”category_id”:65,”language_id”:1,”title”:”Explained”,”alt”:””,”keywords”:””,”seo_title”:”Explained: articles for beginners about cryptocurrency and blockchain.”,”description”:”

What is Bitcoin? How does blockchain work? How to mine cryptocurrency? We are glad to help you answer these questions with our quick guides in Explained section.

n”,”seo_description”:”What is Bitcoin? How does blockchain work? How to mine cryptocurrency? We are glad to help you answer these questions with our quick guides in Explained section.”},”words_count”:1249,”description”:”The encryption process generates cryptographic keys that are used to lock (encrypt) and unlock (decrypt) data. There are two forms of encryption keys: symmetric and asymmetric”,”author”:{“id”:885,”title”:”Nigel Smart”,”url”:”nigel-smart”,”twitter”:””,”google_plus”:””,”photo”:null,”gender”:”male”,”description”:”Nigel Smart is a professor of the COSIC group at the KU Leuven. He is a world-renowned expert in applied cryptography and was vice president of the International Association for Cryptologic Research and a fellow of the IACR. He co-founded Unbound Tech in 2014 with Prof. Yehuda Lindell and Guy Pe’er.”,”facebook”:””,”email”:””,”linkedin”:””,”created_at”:”2020-02-28 14:18:49″,”updated_at”:”2020-02-28 14:18:49″,”deleted_at”:null,”avatar”:”https://cointelegraph.com/assets/img/icons/author_male.jpg”,”hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL25pZ2VsLXNtYXJ0″,”relativeUrl”:”https://cointelegraph.com/authors/nigel-smart”,”user_id”:885,”language_id”:1,”name”:”Nigel Smart”,”desc”:”Nigel Smart is a professor of the COSIC group at the KU Leuven. He is a world-renowned expert in applied cryptography and was vice president of the International Association for Cryptologic Research and a fellow of the IACR. He co-founded Unbound Tech in 2014 with Prof. Yehuda Lindell and Guy Pe’er.”,”seo_title”:””,”seo_description”:””,”enabled”:0,”show_in_authors”:0,”show_in_experts”:0},”category_id”:65,”audio”:”https://s3.cointelegraph.com/audio/40377.65f2cdb5-5a50-4e5e-ab16-fe3f93ff881e.mp3″,”tags”:[{“name”:”Blockchain”,”uri”:”/tags/blockchain”,”super”:1,”page_title”:”Blockchain News”},{“name”:”Cryptocurrencies”,”uri”:”/tags/cryptocurrencies”,”super”:0,”page_title”:”Cryptocurrencies News”},{“name”:”Security”,”uri”:”/tags/security”,”super”:0,”page_title”:”Security News”},{“name”:”Encryption”,”uri”:”/tags/encryption”,”super”:0,”page_title”:”Encryption News”},{“name”:”Cryptography”,”uri”:”/tags/cryptography”,”super”:0,”page_title”:”Cryptography News”}],”tag_title”:”Blockchain”,”date”:”23 MINUTES AGO”,”badge”:{“title”:”Opinion”,”label”:”success”},”qty”:0,”stats_pixel”:”“,”stats_pixel_url”:”https://zoa.cointelegraph.com/pixel?postId=40377&regionId=1″,”shares”:4,”infographic”:false,”sponsored”:false,”explained”:true,”press_release”:false,”show_referral”:true,”social_description”:”Complete security depends on cryptographic key management: here’s what you need to know”,”social_translators”:{“clipboard_popup_label”:”Link copied”,”socialWechatFooterError”:”WeChat error”,”socialWechatFooterText”:”WeChat share”,”socialWechatHeaderText”:”WeChat share”},”social_shares”:{“post_id”:40377,”post_url”:”https://cointelegraph.com/explained/secure-encryption-key-management-modules-explained”,”post_titles”:{“normal”:”Secure Encryption Key Management Modules, Explained”,”twitter”:”Secure Encryption Key Management Modules, Explained”},”post_text”:{“normal”:”Secure Encryption Key Management Modules, Explained”,”twitter”:”Secure Encryption Key Management Modules, Explained https://cointelegraph.com/explained/secure-encryption-key-management-modules-explained via @cointelegraph”},”accounts”:{“twitter”:”@cointelegraph”}},”socials”:{“facebook”:{“url”:”https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fsecure-encryption-key-management-modules-explained”,”count”:null,”short”:”fb”,”fa”:”facebook”},”twitter”:{“url”:”https://twitter.com/intent/tweet?text=Secure+Encryption+Key+Management+Modules%2C+Explained https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fsecure-encryption-key-management-modules-explained via @cointelegraph”,”count”:null,”short”:”tw”,”fa”:”twitter”},”telegram”:{“url”:”https://telegram.me/share/url?url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fsecure-encryption-key-management-modules-explained &text=Secure+Encryption+Key+Management+Modules%2C+Explained”,”count”:null,”short”:”tg”,”fa”:”paper-plane”},”whatsapp”:{“url”:”https://api.whatsapp.com/send?text=Secure+Encryption+Key+Management+Modules%2C+Explained&href=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fsecure-encryption-key-management-modules-explained”,”count”:null,”short”:”wu”,”fa”:”whatsapp”},”gplus”:{“url”:”https://plus.google.com/share?url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fsecure-encryption-key-management-modules-explained”,”count”:null,”short”:”gplus”,”fa”:”google-plus”},”reddit”:{“url”:”https://www.reddit.com/submit?url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fsecure-encryption-key-management-modules-explained&title=Secure+Encryption+Key+Management+Modules%2C+Explained”,”count”:null,”short”:”reddit”,”fa”:”reddit-alien”},”linkedin”:{“url”:”https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fsecure-encryption-key-management-modules-explained&title=Secure+Encryption+Key+Management+Modules%2C+Explained”,”count”:null,”short”:”li”,”fa”:”linkedin”}},”hide_disclaimer”:false,”elink”:”https://cointelegraph.com”,”etitle”:”Cointelegraph”,”elogo_x2″:”https://images.cointelegraph.com/images/528_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hYjAzYTJhMmNlOWEyMWRjMWYwOTYxZDkxNzMxYzhiYS5wbmc=.png”,”elogo_x1″:”https://images.cointelegraph.com/images/260_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hYjAzYTJhMmNlOWEyMWRjMWYwOTYxZDkxNzMxYzhiYS5wbmc=.png”,”elogo_svg”:false,”content”:[{“id”:1245,”post_id”:40377,”title”:”What are cryptographic keys, and why should they be kept safe?”,”content”:”

A cryptographic key is a string of data that is used to encrypt data (to the data secret), decrypt data (to perform the reverse operation), sign data (to ensure the data is authentic), or to verify a signature.

nn

Encryption keys come in two forms: symmetric or asymmetric. In a symmetric algorithm, the key to encrypt and decrypt is the same, while in an asymmetric algorithm, the keys are different, with the encryption key being called the public key and the decryption key being called the private key.

nn

For authenticating data, we often think of signing and verifying as an asymmetric algorithm.

nn

If Alice wants to send a secret message to Bob using symmetric cryptography, she will generate a cipher — or key — to encrypt that data. Bob receives the encrypted message and can decrypt it once he has the key.

nn

The problem is, how does Bob get the symmetric key to decrypt the message? Clearly this cannot just be sent out in the open, thus Bob needs a different technique to obtain the secret key. This is known as the key distribution problem.

nn

In the mid 1970s, this problem was solved by the invention of the asymmetric form of cryptography mentioned above, which is often called public key cryptography. Using public key cryptography, Alice sends her message to Bob and encrypts it using his public key. Anyone can intercept the message, but only Bob can decrypt it using his private key.

nn

In cryptocurrency, public keys are assigned to wallets, and a public key is valid if there is some cryptocurrency in the wallet.

nn

For Alice to send Bitcoin (BTC) to Bob, she simply signs a transaction with the private key associated to the wallet from which she is spending it. The transaction says that the associated Bitcoin should be attributed to the wallet with Bob’s public key. The miners validating the transaction need to check that Alice’s wallet has enough Bitcoin in it, and that the signature is correct. They do not need to know who Alice or Bob actually is.

nn

It is very important to keep private keys private.

nn

Asymmetric key encryption

nn

If a malicious third party gains access to Alice’s private keys, they have full control over all of the currency in her wallet. Hackers expend much time and energy devising elaborate phishing scams designed to dupe users into revealing their private keys.

nnn”,”created_at”:”2020-02-28 17:25:18″,”updated_at”:”2020-02-28 17:25:18″,”sort”:1,”translations”:{“id”:1238,”explained_post_id”:1245,”title_en”:”What are cryptographic keys, and why should they be kept safe?”,”content_en”:”

A cryptographic key is a string of data that is used to encrypt data (to the data secret), decrypt data (to perform the reverse operation), sign data (to ensure the data is authentic), or to verify a signature.

nn

Encryption keys come in two forms: symmetric or asymmetric. In a symmetric algorithm, the key to encrypt and decrypt is the same, while in an asymmetric algorithm, the keys are different, with the encryption key being called the public key and the decryption key being called the private key.

nn

For authenticating data, we often think of signing and verifying as an asymmetric algorithm.

nn

If Alice wants to send a secret message to Bob using symmetric cryptography, she will generate a cipher — or key — to encrypt that data. Bob receives the encrypted message and can decrypt it once he has the key.

nn

The problem is, how does Bob get the symmetric key to decrypt the message? Clearly this cannot just be sent out in the open, thus Bob needs a different technique to obtain the secret key. This is known as the key distribution problem.

nn

In the mid 1970s, this problem was solved by the invention of the asymmetric form of cryptography mentioned above, which is often called public key cryptography. Using public key cryptography, Alice sends her message to Bob and encrypts it using his public key. Anyone can intercept the message, but only Bob can decrypt it using his private key.

nn

In cryptocurrency, public keys are assigned to wallets, and a public key is valid if there is some cryptocurrency in the wallet.

nn

For Alice to send Bitcoin (BTC) to Bob, she simply signs a transaction with the private key associated to the wallet from which she is spending it. The transaction says that the associated Bitcoin should be attributed to the wallet with Bob’s public key. The miners validating the transaction need to check that Alice’s wallet has enough Bitcoin in it, and that the signature is correct. They do not need to know who Alice or Bob actually is.

nn

It is very important to keep private keys private.

nn

Asymmetric key encryption

nn

If a malicious third party gains access to Alice’s private keys, they have full control over all of the currency in her wallet. Hackers expend much time and energy devising elaborate phishing scams designed to dupe users into revealing their private keys.

nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2020-02-28 17:25:18″,”updated_at”:”2020-02-28 13:38:52″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:1246,”post_id”:40377,”title”:”What is Multisig?”,”content”:”

Multisig, also known as multisignature, involves using more than one public key to authorize a transaction.

nn

Alice’s Bitcoin payment to Bob explained above could be considered as a “single-signature” transaction, as only Alice needs to use her private key. In a multisig transaction, multiple signatures are verified against a defined quorum structure.

nn

How multisignature security works

nn

For example, if Alice and Bob decide to open a business together they could apply multisig to their business wallet. The wallet corresponding to Alice and Bob’s joint account has two public keys. If they want to send a payment, both must use their private keys to authorize the transaction.

nn

Multisig can also be set up with more complex configurations, often called N-out-of-M. This means that for any given transaction approval, N approvals out of M total approvers must be provided. So, a multisig setup could require that a majority of approvals is needed in order to verify and complete the transaction, such as 3-out-of-5 or 5-out-of-8.

nn

Multisig is used as a way of enhancing account security. The idea is that, even if one set of private keys is lost or stolen, the funds are secure.

nnn”,”created_at”:”2020-02-28 17:28:26″,”updated_at”:”2020-02-28 17:28:26″,”sort”:2,”translations”:{“id”:1239,”explained_post_id”:1246,”title_en”:”What is Multisig?”,”content_en”:”

Multisig, also known as multisignature, involves using more than one public key to authorize a transaction.

nn

Alice’s Bitcoin payment to Bob explained above could be considered as a “single-signature” transaction, as only Alice needs to use her private key. In a multisig transaction, multiple signatures are verified against a defined quorum structure.

nn

How multisignature security works

nn

For example, if Alice and Bob decide to open a business together they could apply multisig to their business wallet. The wallet corresponding to Alice and Bob’s joint account has two public keys. If they want to send a payment, both must use their private keys to authorize the transaction.

nn

Multisig can also be set up with more complex configurations, often called N-out-of-M. This means that for any given transaction approval, N approvals out of M total approvers must be provided. So, a multisig setup could require that a majority of approvals is needed in order to verify and complete the transaction, such as 3-out-of-5 or 5-out-of-8.

nn

Multisig is used as a way of enhancing account security. The idea is that, even if one set of private keys is lost or stolen, the funds are secure.

nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2020-02-28 17:28:26″,”updated_at”:”2020-02-28 13:38:51″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:1247,”post_id”:40377,”title”:”What is a hardware security module?”,”content”:”

A hardware security module, or HSM, is a piece of specialized physical hardware designed to keep keys secure and carry out cryptographic operations.

nn

HSMs are an additional layer of security for protecting private keys, and have traditionally been used in standard banking.

nn

Hardware security module

nn

When you place your ATM card into a machine, it engages in a protocol with the HSMs that are inside the bank’s data center. The HSMs store all of the cryptographic keys needed to operate the bank and authenticate ATM cards.

nn

A traditional bank has millions of secret keys that need to be managed, and each ATM or credit card will have its own symmetric key, or private key, as well as various other entities within the bank. This creates a huge key management headache for banks in creating keys when a new card is created, destroying keys when a card is revoked, rotating keys, and so on.

nn

These functions are resolved through the bank’s HSM infrastructure. As a traditional bank is only as secure as the security around these cryptographic keys, the HSMs are designed to be resistant to intruders, including intruders working for the bank.

nn

They are designed to be tamper-evident, providing evidence if someone tries to break into them, or they might even self-destruct upon detecting unusual activity such as someone trying to open the HSM.

nn

To provide additional layers of security, HSMs are often housed deep within the secure data centers of the bank.

nnn”,”created_at”:”2020-02-28 17:30:16″,”updated_at”:”2020-02-28 17:30:16″,”sort”:3,”translations”:{“id”:1240,”explained_post_id”:1247,”title_en”:”What is a hardware security module?”,”content_en”:”

A hardware security module, or HSM, is a piece of specialized physical hardware designed to keep keys secure and carry out cryptographic operations.

nn

HSMs are an additional layer of security for protecting private keys, and have traditionally been used in standard banking.

nn

Hardware security module

nn

When you place your ATM card into a machine, it engages in a protocol with the HSMs that are inside the bank’s data center. The HSMs store all of the cryptographic keys needed to operate the bank and authenticate ATM cards.

nn

A traditional bank has millions of secret keys that need to be managed, and each ATM or credit card will have its own symmetric key, or private key, as well as various other entities within the bank. This creates a huge key management headache for banks in creating keys when a new card is created, destroying keys when a card is revoked, rotating keys, and so on.

nn

These functions are resolved through the bank’s HSM infrastructure. As a traditional bank is only as secure as the security around these cryptographic keys, the HSMs are designed to be resistant to intruders, including intruders working for the bank.

nn

They are designed to be tamper-evident, providing evidence if someone tries to break into them, or they might even self-destruct upon detecting unusual activity such as someone trying to open the HSM.

nn

To provide additional layers of security, HSMs are often housed deep within the secure data centers of the bank.

nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2020-02-28 17:30:16″,”updated_at”:”2020-02-28 13:38:51″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:1248,”post_id”:40377,”title”:”What is multiparty computation?”,”content”:”

Multiparty computation, or MPC, allows different parties with their own private inputs to conduct a joint computation on their inputs. The parties learn the outcome of the computation, but each learns nothing about the other parties’ respective inputs.

nn

An algorithm created by cryptographer Adi Shamir, called Shamir’s Secret Sharing, lies at the heart of multiparty computation. A

nn

 

nn

secret sharing scheme involves distributing pieces of one secret value (private key) across multiple network nodes or users. Only once a specified subset of the parties pool their pieces together can they retrieve the value.

nn

Secure multiparty computation

nn

On its own, this allows us to split data up securely over geographic locations. However, this concept can also apply to performing computational tasks on a secret shared value known as secure MPC.

nn

Using protocols associated with the secret sharing scheme, the parties can perform any computational task on the shared data without needing to bring the associated parts back together.

nn

The secure MPC concept can apply to any type of private data, whether it’s personal data, shared corporate data or a user’s private key.

nn

The traditional demonstrative example is to consider two or more hospitals that wish to conduct a statistical analysis of their patients. With MPC, they can obtain the resulting statistics without ever having to reveal the details of their own patients to the other hospitals.

nn

The same idea can be applied to private keys associated with cryptography. In the hospital example, instead of combining sets of (patient) data, the data (single private key) is instead split into multiple pieces of data, which is then stored in separate locations. These locations can then use MPC to compute any computation using the private key, for example a signature, without the private key needing to be reconstructed.

nn

For example, a Bitcoin private key could be split into pieces, with each piece encrypted separately. Each piece is distributed to a network node. The network can perform computations on the data while keeping the underlying data encrypted and, therefore, private.

nn

The concept of MPC has been around for decades. However, practical use cases have only emerged over more recent years. Now, the technology is finally gaining traction, having been featured in various Gartner Hype Cycles since 2017. MPC is already in use by some of the world’s leading banks and technology firms, protecting assets worth billions of dollars.

nnn”,”created_at”:”2020-02-28 17:32:14″,”updated_at”:”2020-02-28 17:32:14″,”sort”:4,”translations”:{“id”:1241,”explained_post_id”:1248,”title_en”:”What is multiparty computation?”,”content_en”:”

Multiparty computation, or MPC, allows different parties with their own private inputs to conduct a joint computation on their inputs. The parties learn the outcome of the computation, but each learns nothing about the other parties’ respective inputs.

nn

An algorithm created by cryptographer Adi Shamir, called Shamir’s Secret Sharing, lies at the heart of multiparty computation. A

nn

 

nn

secret sharing scheme involves distributing pieces of one secret value (private key) across multiple network nodes or users. Only once a specified subset of the parties pool their pieces together can they retrieve the value.

nn

Secure multiparty computation

nn

On its own, this allows us to split data up securely over geographic locations. However, this concept can also apply to performing computational tasks on a secret shared value known as secure MPC.

nn

Using protocols associated with the secret sharing scheme, the parties can perform any computational task on the shared data without needing to bring the associated parts back together.

nn

The secure MPC concept can apply to any type of private data, whether it’s personal data, shared corporate data or a user’s private key.

nn

The traditional demonstrative example is to consider two or more hospitals that wish to conduct a statistical analysis of their patients. With MPC, they can obtain the resulting statistics without ever having to reveal the details of their own patients to the other hospitals.

nn

The same idea can be applied to private keys associated with cryptography. In the hospital example, instead of combining sets of (patient) data, the data (single private key) is instead split into multiple pieces of data, which is then stored in separate locations. These locations can then use MPC to compute any computation using the private key, for example a signature, without the private key needing to be reconstructed.

nn

For example, a Bitcoin private key could be split into pieces, with each piece encrypted separately. Each piece is distributed to a network node. The network can perform computations on the data while keeping the underlying data encrypted and, therefore, private.

nn

The concept of MPC has been around for decades. However, practical use cases have only emerged over more recent years. Now, the technology is finally gaining traction, having been featured in various Gartner Hype Cycles since 2017. MPC is already in use by some of the world’s leading banks and technology firms, protecting assets worth billions of dollars.

nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2020-02-28 17:32:14″,”updated_at”:”2020-02-28 13:38:51″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:1249,”post_id”:40377,”title”:”Comparing multisig, HSM and MPC in cryptocurrencies”,”content”:”

Multisig, HSM and MPC all aim to enhance security and privacy. However, each comes with its own specific benefits and challenges.

nn

In multisig, we obtain additional security by using multiple keys to produce the same task that would normally be done via a single key. Therefore, it offers the key benefit of enhanced approval requirements, meaning that the risks associated with depending on a single user are eliminated. It also enhances compliance with regulatory requirements for segregation of responsibilities.

nn

However, multisig has many limitations. For example, it is not supported by all cryptocurrencies, and replacing users in a multisig setup can be difficult, as can changing the quorum. Replacing users is likely to involve transferring funds out of the account so that the changes can be implemented. This is cumbersome for larger organizations and companies with a high employee turnover.

nn

Perhaps the most critical limitation is that multisig does not offer any private key protection in and of itself. This is why many organizations choose an HSM.

nn

With HSMs, they obtain additional security by using secure hardware to store the keys.

nn

However, they aren’t infallible: In 2019, researchers from wallet provider Ledger were able to hack a well-known HSM. Another challenge is that general-purpose HSM hardware does not address the issue of fraudulent key use by internal employees, only that of theft. They are also very expensive to set up and maintain.

nn

Cryptocurrency exchanges tend to rely on a combination of multisig and hardware such as hard wallets or HSM. However, transferring funds between cold storage wallets using multisig can significantly slow transaction speeds, resulting in operational inefficiencies.

nn

Unlike multisig and HSMs, MPCs allow for geographic separation and independent controls in each location to secure the cryptographic data.

nn

A secure MPC comprises a rare combination of distribution and distributed computation, along with encryption. As such, it offers considerable opportunities for improving data privacy and security. Although the technology has made significant strides over recent years, it still requires significant expertise to deploy on one’s own.

nnn”,”created_at”:”2020-02-28 17:33:03″,”updated_at”:”2020-02-28 17:33:03″,”sort”:5,”translations”:{“id”:1242,”explained_post_id”:1249,”title_en”:”Comparing multisig, HSM and MPC in cryptocurrencies”,”content_en”:”

Multisig, HSM and MPC all aim to enhance security and privacy. However, each comes with its own specific benefits and challenges.

nn

In multisig, we obtain additional security by using multiple keys to produce the same task that would normally be done via a single key. Therefore, it offers the key benefit of enhanced approval requirements, meaning that the risks associated with depending on a single user are eliminated. It also enhances compliance with regulatory requirements for segregation of responsibilities.

nn

However, multisig has many limitations. For example, it is not supported by all cryptocurrencies, and replacing users in a multisig setup can be difficult, as can changing the quorum. Replacing users is likely to involve transferring funds out of the account so that the changes can be implemented. This is cumbersome for larger organizations and companies with a high employee turnover.

nn

Perhaps the most critical limitation is that multisig does not offer any private key protection in and of itself. This is why many organizations choose an HSM.

nn

With HSMs, they obtain additional security by using secure hardware to store the keys.

nn

However, they aren’t infallible: In 2019, researchers from wallet provider Ledger were able to hack a well-known HSM. Another challenge is that general-purpose HSM hardware does not address the issue of fraudulent key use by internal employees, only that of theft. They are also very expensive to set up and maintain.

nn

Cryptocurrency exchanges tend to rely on a combination of multisig and hardware such as hard wallets or HSM. However, transferring funds between cold storage wallets using multisig can significantly slow transaction speeds, resulting in operational inefficiencies.

nn

Unlike multisig and HSMs, MPCs allow for geographic separation and independent controls in each location to secure the cryptographic data.

nn

A secure MPC comprises a rare combination of distribution and distributed computation, along with encryption. As such, it offers considerable opportunities for improving data privacy and security. Although the technology has made significant strides over recent years, it still requires significant expertise to deploy on one’s own.

nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2020-02-28 17:33:03″,”updated_at”:”2020-02-28 13:38:51″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:1250,”post_id”:40377,”title”:”Who requires secure key management practices?”,”content”:”

Any business handling large sums of money and high transaction volumes of digital assets needs secure key management practices.

nn

In the crypto space, this includes native custodians such as Coinbase Custody, BitGo or Gemini. It also includes traditional institutions such as Fidelity or ICE’s Bakkt that have branched out into the digital asset space. 

nn

Crypto exchanges also require secure key management practices. Although the exchange industry is maturing, there were still a record 12 major hacks in 2019 alone.

nnn”,”created_at”:”2020-02-28 17:33:51″,”updated_at”:”2020-02-28 17:33:51″,”sort”:6,”translations”:{“id”:1243,”explained_post_id”:1250,”title_en”:”Who requires secure key management practices?”,”content_en”:”

Any business handling large sums of money and high transaction volumes of digital assets needs secure key management practices.

nn

In the crypto space, this includes native custodians such as Coinbase Custody, BitGo or Gemini. It also includes traditional institutions such as Fidelity or ICE’s Bakkt that have branched out into the digital asset space. 

nn

Crypto exchanges also require secure key management practices. Although the exchange industry is maturing, there were still a record 12 major hacks in 2019 alone.

nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2020-02-28 17:33:51″,”updated_at”:”2020-02-28 13:38:51″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:1251,”post_id”:40377,”title”:”Key management providers, examples”,”content”:”

While many exchanges or custodians still operate a multisig cold wallet approach, there are now several key management providers on the market.

nn

Unbound Tech is the first to offer a virtual HSM, called Crypto Asset Security Platform, or CASP, using secure MPC. It distributes private keys and transaction approval, validation and signing, among multiple approvers — including offline participation and bots. The company is backed by investors including Citi and Goldman Sachs. CASP is also the first MPC-based virtual HSM to receive FIPS 140-2 Level 2 accreditation, the benchmark for validating the effectiveness of cryptographic hardware. Unbound Tech provides services to custodians and exchanges, including Liquid, along with several Fortune 500 clients.

nn

Curv is another provider using MPC for transaction signing and publishing to the blockchain. Its policy engine allows flexible and advanced approval policies according to customer requirements. Encryption keys are split between the Curv service and the client. 

nn

BitGo is perhaps one of the best-known operators in the institutional wallet space. The company provides custody and liquidity solutions for over 100 coins, combining hot and cold wallets, policy management and multisig capabilities.

nn

Finally, wallet provider Ledger also offers a solution called Ledger Vault to institutional clients. Vault enables secure transactions and protects keys in HSMs running Vault’s purpose-built operational system. The platform supports multi-authorization schemes and addresses whitelists for transactions.

nn

The views, thoughts and opinions expressed here are the author’s alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.

nn

n

n

Nigel Smart is a professor of the COSIC group at the KU Leuven. He is a world-renowned expert in applied cryptography and was vice president of the International Association for Cryptologic Research and a fellow of the IACR. He co-founded Unbound Tech in 2014 with Prof. Yehuda Lindell and Guy Pe’er.

n

n

nnn”,”created_at”:”2020-02-28 17:37:28″,”updated_at”:”2020-02-28 17:37:28″,”sort”:7,”translations”:{“id”:1244,”explained_post_id”:1251,”title_en”:”Key management providers, examples”,”content_en”:”

While many exchanges or custodians still operate a multisig cold wallet approach, there are now several key management providers on the market.

nn

Unbound Tech is the first to offer a virtual HSM, called Crypto Asset Security Platform, or CASP, using secure MPC. It distributes private keys and transaction approval, validation and signing, among multiple approvers — including offline participation and bots. The company is backed by investors including Citi and Goldman Sachs. CASP is also the first MPC-based virtual HSM to receive FIPS 140-2 Level 2 accreditation, the benchmark for validating the effectiveness of cryptographic hardware. Unbound Tech provides services to custodians and exchanges, including Liquid, along with several Fortune 500 clients.

nn

Curv is another provider using MPC for transaction signing and publishing to the blockchain. Its policy engine allows flexible and advanced approval policies according to customer requirements. Encryption keys are split between the Curv service and the client. 

nn

BitGo is perhaps one of the best-known operators in the institutional wallet space. The company provides custody and liquidity solutions for over 100 coins, combining hot and cold wallets, policy management and multisig capabilities.

nn

Finally, wallet provider Ledger also offers a solution called Ledger Vault to institutional clients. Vault enables secure transactions and protects keys in HSMs running Vault’s purpose-built operational system. The platform supports multi-authorization schemes and addresses whitelists for transactions.

nn

The views, thoughts and opinions expressed here are the author’s alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.

nn

n

n

Nigel Smart is a professor of the COSIC group at the KU Leuven. He is a world-renowned expert in applied cryptography and was vice president of the International Association for Cryptologic Research and a fellow of the IACR. He co-founded Unbound Tech in 2014 with Prof. Yehuda Lindell and Guy Pe’er.

n

n

nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2020-02-28 17:37:28″,”updated_at”:”2020-02-28 13:38:51″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}}],”is_partner_material”:false,”commentsSection”:{“schemaEntityUrl”:”//cointelegraph.com/explained/secure-encryption-key-management-modules-explained”,”list”:[],”amount”:0,”i18n”:{“addComment”:”Add a comment…”,”amountOnePostfix”:”Comment”,”amountPostfix”:”Comments”,”cancel”:”Cancel”,”delete”:”Delete”,”edit”:”Edit”,”errorBig”:”Comment text cannot be longer than 2000 characters”,”errorDuplicate”:”Duplicate comment”,”errorSmall”:”Comment text must be at least 2 characters long”,”hideButton”:”Hide comments”,”noComments”:” “,”commentOnModeration”:”Comment on moderation”,”postComment”:”Post”,”reply”:”Reply”,”showAllComments”:”Show All Comments”,”showButtonPostfix”:”comments”,”showButtonPrefix”:”Show”,”signIn”:”Sign in”,”update”:”Update comment”,”commentWasDeleted”:”This comment has been deleted”}},”related”:[{“id”:29207,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy82YmIzY2JkNWJlYWVmNmFiN2YwODA0NWUwZjI0MmEzNy5qcGc=.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy82YmIzY2JkNWJlYWVmNmFiN2YwODA0NWUwZjI0MmEzNy5qcGc=.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy82YmIzY2JkNWJlYWVmNmFiN2YwODA0NWUwZjI0MmEzNy5qcGc=.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy82YmIzY2JkNWJlYWVmNmFiN2YwODA0NWUwZjI0MmEzNy5qcGc=.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy82YmIzY2JkNWJlYWVmNmFiN2YwODA0NWUwZjI0MmEzNy5qcGc=.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy82YmIzY2JkNWJlYWVmNmFiN2YwODA0NWUwZjI0MmEzNy5qcGc=.jpg”,”url”:”https://cointelegraph.com/news/tokenizing-sports-how-the-industry-is-incorporating-crypto”,”title”:”Tokenizing Sports — How the Industry Is Incorporating Crypto”,”lead”:”Cryptocurrency and blockchain tech are starting to proliferate in the world of sports — through partnerships with the biggest teams around the world.”,”leadfull”:””,”category_id”:19,”category_url”:”https://cointelegraph.com/category/analysis”,”category_title”:”Analysis”,”author_url”:”https://cointelegraph.com/authors/gareth-jenkinson”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2dhcmV0aC1qZW5raW5zb24=”,”author_title”:”Gareth Jenkinson”,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9iZGQzODQzY2VkMzVhNWNhNGQzYzExOTdmMTc0NGY0MC5qcGc=.jpg”,”date”:”JUL 28, 2019″,”flash_date”:”JUL 28, 2019″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”Analysis”,”label”:”info”},”published”:{“date”:”2019-07-28 19:10:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:13603,”rss_date”:”Sun, 28 Jul 2019 19:10:00 +0100″,”publishedW3″:”2019-07-28T19:10:00+01:00″},{“id”:39799,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy8zMzQ0ZmQ1NzhjNTVkNzY5NzY0MzUzM2MxZTBmMzU5Ni5qcGc=.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy8zMzQ0ZmQ1NzhjNTVkNzY5NzY0MzUzM2MxZTBmMzU5Ni5qcGc=.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy8zMzQ0ZmQ1NzhjNTVkNzY5NzY0MzUzM2MxZTBmMzU5Ni5qcGc=.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy8zMzQ0ZmQ1NzhjNTVkNzY5NzY0MzUzM2MxZTBmMzU5Ni5qcGc=.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy8zMzQ0ZmQ1NzhjNTVkNzY5NzY0MzUzM2MxZTBmMzU5Ni5qcGc=.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy8zMzQ0ZmQ1NzhjNTVkNzY5NzY0MzUzM2MxZTBmMzU5Ni5qcGc=.jpg”,”url”:”https://cointelegraph.com/news/vr-world-lets-users-enjoy-digital-assets-in-an-immersive-way”,”title”:”VR World Lets Users Enjoy Digital Assets in an Immersive Way”,”lead”:”A blockchain-powered VR platform says it allows players to enjoy their digital assets in a fully immersive way — “as if they were physically there.””,”leadfull”:””,”category_id”:62,”category_url”:”https://cointelegraph.com/category/sponsored”,”category_title”:”Sponsored”,”author_url”:”https://cointelegraph.com/authors/connor-blenkinsop”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2Nvbm5vci1ibGVua2luc29w”,”author_title”:”Connor Blenkinsop”,”author_img”:”https://cointelegraph.com/assets/img/icons/author_male.jpg”,”date”:”FEB 18, 2020″,”flash_date”:”FEB 18, 2020″,”sponsored”:true,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”Sponsored”,”label”:”default”},”published”:{“date”:”2020-02-18 16:52:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:3946,”rss_date”:”Tue, 18 Feb 2020 16:52:00 +0000″,”publishedW3″:”2020-02-18T16:52:00+00:00″},{“id”:39580,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy8xYmQ4NmE0N2IxMjY4MmE1NjRjOTY1MTIzM2UwMzU3Yy5qcGc=.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy8xYmQ4NmE0N2IxMjY4MmE1NjRjOTY1MTIzM2UwMzU3Yy5qcGc=.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy8xYmQ4NmE0N2IxMjY4MmE1NjRjOTY1MTIzM2UwMzU3Yy5qcGc=.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy8xYmQ4NmE0N2IxMjY4MmE1NjRjOTY1MTIzM2UwMzU3Yy5qcGc=.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy8xYmQ4NmE0N2IxMjY4MmE1NjRjOTY1MTIzM2UwMzU3Yy5qcGc=.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy8xYmQ4NmE0N2IxMjY4MmE1NjRjOTY1MTIzM2UwMzU3Yy5qcGc=.jpg”,”url”:”https://cointelegraph.com/news/coinbase-fails-to-top-cryptocompares-exchange-rankings-due-to-2019-flash-crash”,”title”:”Coinbase Fails to Top CryptoCompare’s Exchange Rankings due to 2019 Flash Crash”,”lead”:”Coinbase misses the number one spot among platforms on CryptoCompare’s new Exchange Benchmark due to a 2019 Bitcoin price glitch.”,”leadfull”:””,”category_id”:2,”category_url”:”https://cointelegraph.com/category/latest-news”,”category_title”:”Latest News”,”author_url”:”https://cointelegraph.com/authors/helen-partz”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2hlbGVuLXBhcnR6″,”author_title”:”Helen Partz”,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy84NmZhZWYyMGQzMGZjNzM5MTY5ZWVkZWJkM2Q1Njk4OS5qcGc=.jpg”,”date”:”FEB 13, 2020″,”flash_date”:”FEB 13, 2020″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”News”,”label”:”default”},”published”:{“date”:”2020-02-13 19:24:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:5022,”rss_date”:”Thu, 13 Feb 2020 19:24:00 +0000″,”publishedW3″:”2020-02-13T19:24:00+00:00″},{“id”:39826,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy83YmJiMDRhMDE4MzE3ODA5ZTJjMTBkNzhhNmQ0YWVjNS5qcGc=.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy83YmJiMDRhMDE4MzE3ODA5ZTJjMTBkNzhhNmQ0YWVjNS5qcGc=.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy83YmJiMDRhMDE4MzE3ODA5ZTJjMTBkNzhhNmQ0YWVjNS5qcGc=.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy83YmJiMDRhMDE4MzE3ODA5ZTJjMTBkNzhhNmQ0YWVjNS5qcGc=.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy83YmJiMDRhMDE4MzE3ODA5ZTJjMTBkNzhhNmQ0YWVjNS5qcGc=.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy83YmJiMDRhMDE4MzE3ODA5ZTJjMTBkNzhhNmQ0YWVjNS5qcGc=.jpg”,”url”:”https://cointelegraph.com/news/the-law-enforcements-guide-to-policing-crypto-cybercrimes”,”title”:”Law Enforcement’s Guide to Policing Crypto Cybercrimes”,”lead”:”Partnerships, deanonymization and transaction pattern analysis: What else do international police use to detect crypto cybercriminals?”,”leadfull”:””,”category_id”:19,”category_url”:”https://cointelegraph.com/category/analysis”,”category_title”:”Analysis”,”author_url”:”https://cointelegraph.com/authors/julia-magas”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2p1bGlhLW1hZ2Fz”,”author_title”:”Julia Magas”,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy81NjIxNjcxYWViYzQyNzgzN2IzMTNjYTRiNmE2ZTlkNi5qcGc=.jpg”,”date”:”FEB 19, 2020″,”flash_date”:”FEB 19, 2020″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”Analysis”,”label”:”info”},”published”:{“date”:”2020-02-19 03:00:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:2653,”rss_date”:”Wed, 19 Feb 2020 03:00:00 +0000″,”publishedW3″:”2020-02-19T03:00:00+00:00″},{“id”:39986,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9jNDk3YzQwNDdkMzZmOWMxZWE3MTc1ZDU5MTViZWM4NC5qcGc=.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9jNDk3YzQwNDdkMzZmOWMxZWE3MTc1ZDU5MTViZWM4NC5qcGc=.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9jNDk3YzQwNDdkMzZmOWMxZWE3MTc1ZDU5MTViZWM4NC5qcGc=.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9jNDk3YzQwNDdkMzZmOWMxZWE3MTc1ZDU5MTViZWM4NC5qcGc=.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9jNDk3YzQwNDdkMzZmOWMxZWE3MTc1ZDU5MTViZWM4NC5qcGc=.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9jNDk3YzQwNDdkMzZmOWMxZWE3MTc1ZDU5MTViZWM4NC5qcGc=.jpg”,”url”:”https://cointelegraph.com/news/expert-says-new-blockchain-regulation-should-nudge-rather-than-push”,”title”:”Expert Says New Blockchain Regulation Should ‘Nudge’ Rather Than Push”,”lead”:”Regulators should aim to influence public behavior rather than rule with an iron fist when it comes to emerging industries such as blockchain, a new paper argue…”,”leadfull”:””,”category_id”:2,”category_url”:”https://cointelegraph.com/category/latest-news”,”category_title”:”Latest News”,”author_url”:”https://cointelegraph.com/authors/marie-huillet”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL21hcmllLWh1aWxsZXQ=”,”author_title”:”Marie Huillet “,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9kMzUyYjliOTBjMWE4OTQyMTFjYjAxOTZlMWM2YjBmYy5qcGc=.jpg”,”date”:”FEB 21, 2020″,”flash_date”:”FEB 21, 2020″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”News”,”label”:”default”},”published”:{“date”:”2020-02-21 11:47:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:1538,”rss_date”:”Fri, 21 Feb 2020 11:47:00 +0000″,”publishedW3″:”2020-02-21T11:47:00+00:00″},{“id”:40054,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy80ODM0YzhhNzA5YjQyYzI2MTcwYjA4YWFmYzFmYWVjZi5qcGc=.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy80ODM0YzhhNzA5YjQyYzI2MTcwYjA4YWFmYzFmYWVjZi5qcGc=.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy80ODM0YzhhNzA5YjQyYzI2MTcwYjA4YWFmYzFmYWVjZi5qcGc=.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy80ODM0YzhhNzA5YjQyYzI2MTcwYjA4YWFmYzFmYWVjZi5qcGc=.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy80ODM0YzhhNzA5YjQyYzI2MTcwYjA4YWFmYzFmYWVjZi5qcGc=.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy80ODM0YzhhNzA5YjQyYzI2MTcwYjA4YWFmYzFmYWVjZi5qcGc=.jpg”,”url”:”https://cointelegraph.com/news/jp-morgan-digital-money-foundation-laid-blockchain-in-banking-years-away”,”title”:”JP Morgan: Digital Money Foundation Laid, Blockchain In Banking Years Away”,”lead”:”JP Morgan report says that current blockchain developments are lying down the foundation for digital money, but more centralization is needed.”,”leadfull”:””,”category_id”:2,”category_url”:”https://cointelegraph.com/category/latest-news”,”category_title”:”Latest News”,”author_url”:”https://cointelegraph.com/authors/adrian-zmudzinski”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2Fkcmlhbi16bXVkemluc2tp”,”author_title”:”Adrian Zmudzinski”,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy8yNDQ0ZmI4NTc3ZjFhYTRlYmQ4OGUwZTdhZGYxZWI2My5qcGc=.jpg”,”date”:”FEB 23, 2020″,”flash_date”:”FEB 23, 2020″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”News”,”label”:”default”},”published”:{“date”:”2020-02-23 13:15:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:5747,”rss_date”:”Sun, 23 Feb 2020 13:15:00 +0000″,”publishedW3″:”2020-02-23T13:15:00+00:00″}]}” :shares=”{“facebook”:{“url”:”https://www.facebook.com/sharer/sharer.php?u=%URL%”,”icon”:”facebook”,”title”:”Facebook”,”sizesAllowed”:[{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”xs”,”label”:”Smartphones”,”breakpoint”:”> 480px”},{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"}],"position":1,"status":true},"twitter":{"url":"https://twitter.com/intent/tweet?text=%TEXT%","icon":"twitter","title":"Twitter","position":2,"status":true,"sizesAllowed":[{"size":"xxs","label":"Extra small devices","breakpoint":"< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”telegram”:{“url”:”https://t.me/share/url?url=%URL%&text=%TEXT%”,”icon”:”telegram”,”title”:”Telegram”,”position”:3,”status”:true,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”pocket”:{“url”:”https://getpocket.com/save?url=%URL%”,”icon”:”pocket”,”title”:”Pocket”,”position”:4,”status”:true,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”linkedin”:{“url”:”https://www.linkedin.com/shareArticle?mini=true&url=%URL%&title=%TITLE%”,”icon”:”linked-in”,”title”:”LinkedIn”,”position”:5,”status”:true,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”copy”:{“url”:”%URL%”,”icon”:”copy”,”position”:7,”title”:”Copy Link”,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}],”status”:true},”whatsapp”:{“url”:”https://api.whatsapp.com/send?text=%TITLE%&href=%URL%”,”icon”:”whats-app”,”title”:”Whatsapp”,”position”:6,”status”:true,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]}}” is=”ExplainedPostPage”>

A cryptographic key is a string of data that is used to encrypt data (to the data secret), decrypt data (to perform the reverse operation), sign data (to ensure the data is authentic), or to verify a signature.

Encryption keys come in two forms: symmetric or asymmetric. In a symmetric algorithm, the key to encrypt and decrypt is the same, while in an asymmetric algorithm, the keys are different, with the encryption key being called the public key and the decryption key being called the private key.

For authenticating data, we often think of signing and verifying as an asymmetric algorithm.

If Alice wants to send a secret message to Bob using symmetric cryptography, she will generate a cipher — or key — to encrypt that data. Bob receives the encrypted message and can decrypt it once he has the key.

The problem is, how does Bob get the symmetric key to decrypt the message? Clearly this cannot just be sent out in the open, thus Bob needs a different technique to obtain the secret key. This is known as the key distribution problem.

In the mid 1970s, this problem was solved by the invention of the asymmetric form of cryptography mentioned above, which is often called public key cryptography. Using public key cryptography, Alice sends her message to Bob and encrypts it using his public key. Anyone can intercept the message, but only Bob can decrypt it using his private key.

In cryptocurrency, public keys are assigned to wallets, and a public key is valid if there is some cryptocurrency in the wallet.

For Alice to send Bitcoin (BTC) to Bob, she simply signs a transaction with the private key associated to the wallet from which she is spending it. The transaction says that the associated Bitcoin should be attributed to the wallet with Bob’s public key. The miners validating the transaction need to check that Alice’s wallet has enough Bitcoin in it, and that the signature is correct. They do not need to know who Alice or Bob actually is.

It is very important to keep private keys private.

Asymmetric key encryption

If a malicious third party gains access to Alice’s private keys, they have full control over all of the currency in her wallet. Hackers expend much time and energy devising elaborate phishing scams designed to dupe users into revealing their private keys.

Multisig, also known as multisignature, involves using more than one public key to authorize a transaction.

Alice’s Bitcoin payment to Bob explained above could be considered as a “single-signature” transaction, as only Alice needs to use her private key. In a multisig transaction, multiple signatures are verified against a defined quorum structure.

How multisignature security works

For example, if Alice and Bob decide to open a business together they could apply multisig to their business wallet. The wallet corresponding to Alice and Bob’s joint account has two public keys. If they want to send a payment, both must use their private keys to authorize the transaction.

Multisig can also be set up with more complex configurations, often called N-out-of-M. This means that for any given transaction approval, N approvals out of M total approvers must be provided. So, a multisig setup could require that a majority of approvals is needed in order to verify and complete the transaction, such as 3-out-of-5 or 5-out-of-8.

Multisig is used as a way of enhancing account security. The idea is that, even if one set of private keys is lost or stolen, the funds are secure.

A hardware security module, or HSM, is a piece of specialized physical hardware designed to keep keys secure and carry out cryptographic operations.

HSMs are an additional layer of security for protecting private keys, and have traditionally been used in standard banking.

Hardware security module

When you place your ATM card into a machine, it engages in a protocol with the HSMs that are inside the bank’s data center. The HSMs store all of the cryptographic keys needed to operate the bank and authenticate ATM cards.

A traditional bank has millions of secret keys that need to be managed, and each ATM or credit card will have its own symmetric key, or private key, as well as various other entities within the bank. This creates a huge key management headache for banks in creating keys when a new card is created, destroying keys when a card is revoked, rotating keys, and so on.

These functions are resolved through the bank’s HSM infrastructure. As a traditional bank is only as secure as the security around these cryptographic keys, the HSMs are designed to be resistant to intruders, including intruders working for the bank.

They are designed to be tamper-evident, providing evidence if someone tries to break into them, or they might even self-destruct upon detecting unusual activity such as someone trying to open the HSM.

To provide additional layers of security, HSMs are often housed deep within the secure data centers of the bank.

Multiparty computation, or MPC, allows different parties with their own private inputs to conduct a joint computation on their inputs. The parties learn the outcome of the computation, but each learns nothing about the other parties’ respective inputs.

An algorithm created by cryptographer Adi Shamir, called Shamir’s Secret Sharing, lies at the heart of multiparty computation. A

secret sharing scheme involves distributing pieces of one secret value (private key) across multiple network nodes or users. Only once a specified subset of the parties pool their pieces together can they retrieve the value.

Secure multiparty computation

On its own, this allows us to split data up securely over geographic locations. However, this concept can also apply to performing computational tasks on a secret shared value known as secure MPC.

Using protocols associated with the secret sharing scheme, the parties can perform any computational task on the shared data without needing to bring the associated parts back together.

The secure MPC concept can apply to any type of private data, whether it’s personal data, shared corporate data or a user’s private key.

The traditional demonstrative example is to consider two or more hospitals that wish to conduct a statistical analysis of their patients. With MPC, they can obtain the resulting statistics without ever having to reveal the details of their own patients to the other hospitals.

The same idea can be applied to private keys associated with cryptography. In the hospital example, instead of combining sets of (patient) data, the data (single private key) is instead split into multiple pieces of data, which is then stored in separate locations. These locations can then use MPC to compute any computation using the private key, for example a signature, without the private key needing to be reconstructed.

For example, a Bitcoin private key could be split into pieces, with each piece encrypted separately. Each piece is distributed to a network node. The network can perform computations on the data while keeping the underlying data encrypted and, therefore, private.

The concept of MPC has been around for decades. However, practical use cases have only emerged over more recent years. Now, the technology is finally gaining traction, having been featured in various Gartner Hype Cycles since 2017. MPC is already in use by some of the world’s leading banks and technology firms, protecting assets worth billions of dollars.

Multisig, HSM and MPC all aim to enhance security and privacy. However, each comes with its own specific benefits and challenges.

In multisig, we obtain additional security by using multiple keys to produce the same task that would normally be done via a single key. Therefore, it offers the key benefit of enhanced approval requirements, meaning that the risks associated with depending on a single user are eliminated. It also enhances compliance with regulatory requirements for segregation of responsibilities.

However, multisig has many limitations. For example, it is not supported by all cryptocurrencies, and replacing users in a multisig setup can be difficult, as can changing the quorum. Replacing users is likely to involve transferring funds out of the account so that the changes can be implemented. This is cumbersome for larger organizations and companies with a high employee turnover.

Perhaps the most critical limitation is that multisig does not offer any private key protection in and of itself. This is why many organizations choose an HSM.

With HSMs, they obtain additional security by using secure hardware to store the keys.

However, they aren’t infallible: In 2019, researchers from wallet provider Ledger were able to hack a well-known HSM. Another challenge is that general-purpose HSM hardware does not address the issue of fraudulent key use by internal employees, only that of theft. They are also very expensive to set up and maintain.

Cryptocurrency exchanges tend to rely on a combination of multisig and hardware such as hard wallets or HSM. However, transferring funds between cold storage wallets using multisig can significantly slow transaction speeds, resulting in operational inefficiencies.

Unlike multisig and HSMs, MPCs allow for geographic separation and independent controls in each location to secure the cryptographic data.

A secure MPC comprises a rare combination of distribution and distributed computation, along with encryption. As such, it offers considerable opportunities for improving data privacy and security. Although the technology has made significant strides over recent years, it still requires significant expertise to deploy on one’s own.

Any business handling large sums of money and high transaction volumes of digital assets needs secure key management practices.

In the crypto space, this includes native custodians such as Coinbase Custody, BitGo or Gemini. It also includes traditional institutions such as Fidelity or ICE’s Bakkt that have branched out into the digital asset space. 

Crypto exchanges also require secure key management practices. Although the exchange industry is maturing, there were still a record 12 major hacks in 2019 alone.

While many exchanges or custodians still operate a multisig cold wallet approach, there are now several key management providers on the market.

Unbound Tech is the first to offer a virtual HSM, called Crypto Asset Security Platform, or CASP, using secure MPC. It distributes private keys and transaction approval, validation and signing, among multiple approvers — including offline participation and bots. The company is backed by investors including Citi and Goldman Sachs. CASP is also the first MPC-based virtual HSM to receive FIPS 140-2 Level 2 accreditation, the benchmark for validating the effectiveness of cryptographic hardware. Unbound Tech provides services to custodians and exchanges, including Liquid, along with several Fortune 500 clients.

Curv is another provider using MPC for transaction signing and publishing to the blockchain. Its policy engine allows flexible and advanced approval policies according to customer requirements. Encryption keys are split between the Curv service and the client. 

BitGo is perhaps one of the best-known operators in the institutional wallet space. The company provides custody and liquidity solutions for over 100 coins, combining hot and cold wallets, policy management and multisig capabilities.

Finally, wallet provider Ledger also offers a solution called Ledger Vault to institutional clients. Vault enables secure transactions and protects keys in HSMs running Vault’s purpose-built operational system. The platform supports multi-authorization schemes and addresses whitelists for transactions.

The views, thoughts and opinions expressed here are the author’s alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.

Nigel Smart is a professor of the COSIC group at the KU Leuven. He is a world-renowned expert in applied cryptography and was vice president of the International Association for Cryptologic Research and a fellow of the IACR. He co-founded Unbound Tech in 2014 with Prof. Yehuda Lindell and Guy Pe’er.

Loading data ...
Comparison
View chart compare
View table compare
Back To Top