Entrust Identity On Blog
When we talk about hacking these days we're not talking about something that's confined to computers and mobile devices only. Sure, the majority of cybercrime that's carried out currently revolves around these mechanisms, but with the global push toward the Internet of Things, the attack sphere is growing.
In part one, we traced the early history of PKI and highlighted some of the challenges that led to important technological innovations. Today we look back at how managing symmetric keys in the 1970’s was proving problematic – and how key players forged new solutions for a growing need.February 4, 2015 in PKI