SlideShare a Scribd company logo
E N C R Y P T I O N B A S I C S
E V E R Y O N E S H O U L D K N O W
F I R S T R U L E O F
C R Y P T O :
D O N ' T R O L L Y O U R
O W N C R Y P T O
2@NOTTRUPPI | @PAYDROPINC
B A D E X A M P L E S
• AT&T’s Clipper Chip
• BassOmatic
• Telegram’s MTProto
• Crown Sterling
@NOTTRUPPI | @PAYDROPINC 3
A D D I T I O N A L R U L E S
• Encryption is not the answer to security
• Cryptography is not easy
• Cryptography is not cheap
@NOTTRUPPI | @PAYDROPINC 4
T H E R E A L I T Y
• Algorithms will be broken
• The time from acceptance to deprecation is shrinking
• Be thoughtful how the cryptography is applied to your system
@NOTTRUPPI | @PAYDROPINC 5
E X T I N C T I O N
• RC2/RC4
• (X)DES
• SHA-1
• MD2/MD4/MD5
• RSA < 1024bits
• ECDSA - 160bits
• SSL
@NOTTRUPPI | @PAYDROPINC 6
A P P L I E D C R Y P T O G R A P H Y
• Encryption in transit (SSL, TLS)
• Encryption at rest
• Digital certificates
• Digital wallets
• Hashes (MD5, SHA)
• Seeds
• Sharding (Shamir’s Secret Sharing)
• Symmetric encryption (AES)
• Asymmetric encryption (ElGamal)
• Hybrid (symmetric & asymmetric)
• Public-key cryptography (Wallets, ECC)
• Algorithms
• Random number generation
• Multi-signature
• Multi-party computation
@NOTTRUPPI | @PAYDROPINC 7
T H E C R Y P T O O F C R Y P T O
• Random number generators
• Key ceremonies
• Hashing (BTC SHA-256)
• Digital signatures
• Multi-signature
• Multi-party computation
• Mix networks
@NOTTRUPPI | @PAYDROPINC 8
H O W T O R E D U C E R I S K
• All device encryption
• VPNs all the time
• Encrypted applications (messaging, voice)
• Multi-signature wallets
• Use applications compatible with TPM
• Physical hardware keys
@NOTTRUPPI | @PAYDROPINC 9
R E S O U R C E S
• Cryptocurrency Security Standard (CCSS)
• Digital Asset Custody Standard (DACS)
• NIST 800-175B
• NIST FIPS 140-2
• NIST 800-90A
@NOTTRUPPI | @PAYDROPINC 10
T H A N K YO U
JASON TRUPPI
@NotTruppi | @Paydropinc

More Related Content

Similar to Encryption Basics Everyone Should Know

Cryto Party at CCU
Cryto Party at CCUCryto Party at CCU
Cryto Party at CCU
Jose L. Quiñones-Borrero
 
Cryptography for Everyone
Cryptography for EveryoneCryptography for Everyone
Cryptography for Everyone
Serkan Yıldırım
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
ssuserd5e356
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
ppd1961
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
Ghamdan5
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
akamkhalidmohammed
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
RaghavRathi40
 
detailed presentation on cryptography analysis
detailed presentation on cryptography analysisdetailed presentation on cryptography analysis
detailed presentation on cryptography analysis
BARATH800940
 
7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff
maninthemirrorrror
 
Crytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.pptCrytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.ppt
MuhammadShajid1
 
Best book for the cryptography doctor.ppt
Best book for the cryptography doctor.pptBest book for the cryptography doctor.ppt
Best book for the cryptography doctor.ppt
nicolausalex722
 
RSA.ppt
RSA.pptRSA.ppt
the art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptthe art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.ppt
jamkhan10
 
This is the presentation ofcryptography.ppt
This is the presentation ofcryptography.pptThis is the presentation ofcryptography.ppt
This is the presentation ofcryptography.ppt
vimalguptaofficial
 
7 cryptography
7 cryptography7 cryptography
7 cryptography
Upinder Kaur
 
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
AdaCore
 
nabdullin_brcrdu_dark
nabdullin_brcrdu_darknabdullin_brcrdu_dark
nabdullin_brcrdu_dark
Nikita Abdullin
 
Startup Weekend Brussels Makers - Videophone
Startup Weekend Brussels Makers - VideophoneStartup Weekend Brussels Makers - Videophone
Startup Weekend Brussels Makers - Videophone
Eric Rodriguez (Hiring in Lex)
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
tahirilyas92
 
cryptography.ppt
cryptography.pptcryptography.ppt
cryptography.ppt
AkshayaPriyaJanartha
 

Similar to Encryption Basics Everyone Should Know (20)

Cryto Party at CCU
Cryto Party at CCUCryto Party at CCU
Cryto Party at CCU
 
Cryptography for Everyone
Cryptography for EveryoneCryptography for Everyone
Cryptography for Everyone
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
detailed presentation on cryptography analysis
detailed presentation on cryptography analysisdetailed presentation on cryptography analysis
detailed presentation on cryptography analysis
 
7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff
 
Crytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.pptCrytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.ppt
 
Best book for the cryptography doctor.ppt
Best book for the cryptography doctor.pptBest book for the cryptography doctor.ppt
Best book for the cryptography doctor.ppt
 
RSA.ppt
RSA.pptRSA.ppt
RSA.ppt
 
the art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptthe art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.ppt
 
This is the presentation ofcryptography.ppt
This is the presentation ofcryptography.pptThis is the presentation ofcryptography.ppt
This is the presentation ofcryptography.ppt
 
7 cryptography
7 cryptography7 cryptography
7 cryptography
 
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
 
nabdullin_brcrdu_dark
nabdullin_brcrdu_darknabdullin_brcrdu_dark
nabdullin_brcrdu_dark
 
Startup Weekend Brussels Makers - Videophone
Startup Weekend Brussels Makers - VideophoneStartup Weekend Brussels Makers - Videophone
Startup Weekend Brussels Makers - Videophone
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
cryptography.ppt
cryptography.pptcryptography.ppt
cryptography.ppt
 

More from Jason Truppi

Supporting The Future of the Decentralized Workforce
Supporting The Future of the Decentralized WorkforceSupporting The Future of the Decentralized Workforce
Supporting The Future of the Decentralized Workforce
Jason Truppi
 
State of Security - 2017
State of Security - 2017State of Security - 2017
State of Security - 2017
Jason Truppi
 
The Great Cryptographic Divide - Enigma 2018
The Great Cryptographic Divide - Enigma 2018The Great Cryptographic Divide - Enigma 2018
The Great Cryptographic Divide - Enigma 2018
Jason Truppi
 
FBI Crypto Investigations
FBI Crypto InvestigationsFBI Crypto Investigations
FBI Crypto Investigations
Jason Truppi
 
Timeline of crypto hacks and government actions
Timeline of crypto hacks and government actionsTimeline of crypto hacks and government actions
Timeline of crypto hacks and government actions
Jason Truppi
 
Modern Cryptographic Dissidence - B Sides PDX
Modern Cryptographic Dissidence - B Sides PDXModern Cryptographic Dissidence - B Sides PDX
Modern Cryptographic Dissidence - B Sides PDX
Jason Truppi
 
Illusions vs Reality - BSIDES SF
Illusions vs Reality - BSIDES SFIllusions vs Reality - BSIDES SF
Illusions vs Reality - BSIDES SF
Jason Truppi
 

More from Jason Truppi (7)

Supporting The Future of the Decentralized Workforce
Supporting The Future of the Decentralized WorkforceSupporting The Future of the Decentralized Workforce
Supporting The Future of the Decentralized Workforce
 
State of Security - 2017
State of Security - 2017State of Security - 2017
State of Security - 2017
 
The Great Cryptographic Divide - Enigma 2018
The Great Cryptographic Divide - Enigma 2018The Great Cryptographic Divide - Enigma 2018
The Great Cryptographic Divide - Enigma 2018
 
FBI Crypto Investigations
FBI Crypto InvestigationsFBI Crypto Investigations
FBI Crypto Investigations
 
Timeline of crypto hacks and government actions
Timeline of crypto hacks and government actionsTimeline of crypto hacks and government actions
Timeline of crypto hacks and government actions
 
Modern Cryptographic Dissidence - B Sides PDX
Modern Cryptographic Dissidence - B Sides PDXModern Cryptographic Dissidence - B Sides PDX
Modern Cryptographic Dissidence - B Sides PDX
 
Illusions vs Reality - BSIDES SF
Illusions vs Reality - BSIDES SFIllusions vs Reality - BSIDES SF
Illusions vs Reality - BSIDES SF
 

Recently uploaded

ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 

Recently uploaded (20)

ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 

Encryption Basics Everyone Should Know

  • 1. E N C R Y P T I O N B A S I C S E V E R Y O N E S H O U L D K N O W
  • 2. F I R S T R U L E O F C R Y P T O : D O N ' T R O L L Y O U R O W N C R Y P T O 2@NOTTRUPPI | @PAYDROPINC
  • 3. B A D E X A M P L E S • AT&T’s Clipper Chip • BassOmatic • Telegram’s MTProto • Crown Sterling @NOTTRUPPI | @PAYDROPINC 3
  • 4. A D D I T I O N A L R U L E S • Encryption is not the answer to security • Cryptography is not easy • Cryptography is not cheap @NOTTRUPPI | @PAYDROPINC 4
  • 5. T H E R E A L I T Y • Algorithms will be broken • The time from acceptance to deprecation is shrinking • Be thoughtful how the cryptography is applied to your system @NOTTRUPPI | @PAYDROPINC 5
  • 6. E X T I N C T I O N • RC2/RC4 • (X)DES • SHA-1 • MD2/MD4/MD5 • RSA < 1024bits • ECDSA - 160bits • SSL @NOTTRUPPI | @PAYDROPINC 6
  • 7. A P P L I E D C R Y P T O G R A P H Y • Encryption in transit (SSL, TLS) • Encryption at rest • Digital certificates • Digital wallets • Hashes (MD5, SHA) • Seeds • Sharding (Shamir’s Secret Sharing) • Symmetric encryption (AES) • Asymmetric encryption (ElGamal) • Hybrid (symmetric & asymmetric) • Public-key cryptography (Wallets, ECC) • Algorithms • Random number generation • Multi-signature • Multi-party computation @NOTTRUPPI | @PAYDROPINC 7
  • 8. T H E C R Y P T O O F C R Y P T O • Random number generators • Key ceremonies • Hashing (BTC SHA-256) • Digital signatures • Multi-signature • Multi-party computation • Mix networks @NOTTRUPPI | @PAYDROPINC 8
  • 9. H O W T O R E D U C E R I S K • All device encryption • VPNs all the time • Encrypted applications (messaging, voice) • Multi-signature wallets • Use applications compatible with TPM • Physical hardware keys @NOTTRUPPI | @PAYDROPINC 9
  • 10. R E S O U R C E S • Cryptocurrency Security Standard (CCSS) • Digital Asset Custody Standard (DACS) • NIST 800-175B • NIST FIPS 140-2 • NIST 800-90A @NOTTRUPPI | @PAYDROPINC 10
  • 11. T H A N K YO U JASON TRUPPI @NotTruppi | @Paydropinc