Controls

Fitting Forward Secrecy Into Today's Security Architecture

F5 Labs' David Holmes writes for Security Week, discussing the adoption and barriers of Perfect Forward Secrecy.
March 08, 2018
1 min. read

Forward Secrecy’s day has come – for most. The cryptographic technique (sometimes called Perfect Forward Secrecy or PFS), adds an additional layer of confidentiality to an encrypted session, ensuring that only the two endpoints can decrypt the traffic.  With forward secrecy, even if a third party were to record an encrypted session, and later gain access to the server private key, they could not use that key to decrypt a session protected by forward secrecy. Neat, huh?

Read the full article published May 23, 2018 here: https://www.securityweek.com/fitting-forward-secrecy-todays-security-architecture by SecurityWeek.

Join the Discussion
Authors & Contributors
David Holmes (Author)
Sr. Threat Research Evangelist

More from Learning Center

What Is Zero Trust Architecture (ZTA)?
What Is Zero Trust Architecture (ZTA)?
07/05/2022 article 13 min. read
What Is Access Control?
What Is Access Control?
02/09/2022 article 15 min. read
What is Multi-Cloud and How Does It Affect Security?
What is Multi-Cloud and How Does It Affect Security?
11/03/2021 article 13 min. read