AI Engineer - Learn how to integrate AI into software applications
Save 43% on 1 Year of Coursera Plus
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore how hardware/firmware co-design provides critical advantages in post-quantum cryptographic deployments through this 19-minute conference talk. Learn why co-designed systems offer superior agility against evolving threats compared to immutable hardware-only roots of trust, which face potential vulnerabilities to future side-channel attacks and costly remediation processes. Discover how updateable firmware enables proactive responses to emerging security challenges, including side-channel attack patching, parameter updates, and cryptographic migration. Examine real-world security incidents like Checkm8 that demonstrate the risks of static hardware implementations. Understand how co-design approaches enhance security lifecycle resilience, accelerate secure development processes, and support the crypto agility essential for post-quantum cryptography deployment in constrained, real-world environments.
Syllabus
Crypto Agility by Design: Securing PQC with Updatable HW/FW Co-design
Taught by
PKI Consortium