Controls

Fitting Forward Secrecy Into Today's Security Architecture

F5 Labs' David Holmes writes for Security Week, discussing the adoption and barriers of Perfect Forward Secrecy.
March 08, 2018
1 min. read

Forward Secrecy’s day has come – for most. The cryptographic technique (sometimes called Perfect Forward Secrecy or PFS), adds an additional layer of confidentiality to an encrypted session, ensuring that only the two endpoints can decrypt the traffic.  With forward secrecy, even if a third party were to record an encrypted session, and later gain access to the server private key, they could not use that key to decrypt a session protected by forward secrecy. Neat, huh?

Read the full article published May 23, 2018 here: https://www.securityweek.com/fitting-forward-secrecy-todays-security-architecture by SecurityWeek.

Join the Discussion
Authors & Contributors
David Holmes (Author)
Sr. Threat Research Evangelist

More from Learning Center

Forward and Reverse Shells
Forward and Reverse Shells
09/15/2023 article 5 min. read
Web Shells: Understanding Attackers’ Tools and Techniques
Web Shells: Understanding Attackers’ Tools and Techniques
07/06/2023 article 6 min. read
What Is Zero Trust Architecture (ZTA)?
What Is Zero Trust Architecture (ZTA)?
07/05/2022 article 13 min. read