3. Crypto v2.0
• Security Challenges
– New Technology Paradigms
• Digital Currencies
• Big Data
– Legacy Crypto Exists – MD5, AES 128
• Big Data May Cover Multiple Crypto Deployments
• BitCoin, etc. relies on ECC
– Attack Vectors
• (Sensitive) Data Compromise
• Wallet &/or Key Compromise
– Single (Location) Point of Failure
• Lack of Backups
11. Crypto v2.0
• HE vs Multisig
– HE = Parse & Match Key Values
• Keys Can Be Lost
• Allows for Arbitrage
– 3rd
Parties May Be Hacked – Not an issue for Colored Coins
– Multisig = N-to-1 Address to Key Association
• Addresses Can Be Spoofed
• Addresses Are Easier to Determine
• Allows for Arbitrage