• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

War Room

Shells from above

RSM logo

  • Home
  • About
  • Blog
  • Talks/Whitepapers
  • Tools
  • Recreation
Home > R&D > Distributed Security: Advancements in IT Governance using Multi-Party Computation (MPC)

Distributed Security: Advancements in IT Governance using Multi-Party Computation (MPC)

September 16, 2020 By Sam Auch

Imagine never having to remember a password again. To some this might sound crazy, but by combining time-tested cryptography and new technological advancements, this far-fetched proposition is possible. Multi-party computation (MPC) protocols allow users to eliminate the need to remember passwords and potentially much more while simultaneously enhancing data security.

MPC works by distributing parts of an encrypted password or cryptographic keys across multiple parties. These parts are known as shares. The use of shares eliminates the need to remember a password, as long as the shares are installed on users’ device, as the main line of defense against bad actors attempting to steal your sensitive information. Each share can be controlled by a person, organization, or computer bot. In order to maximize security, shares are never decrypted. Users are able to give approvals while keys are in their encrypted state. Companies can gain comfort knowing that in order to access their sensitive data, bad actors must find and decrypt all the companies’ shares. It’s also important to note that the shares refresh, meaning that bad actors not only have to find all the shares but they must decrypt them before the refresh interval is up, usually about one hour.

MPC protocols are easy to use and flexible allowing for almost anyone, regardless of technical ability, to interact with them. As businesses grow and expand into new areas, they will need to have a security infrastructure that can keep up with rapidly growing technology expectations. MPC scales with any business and eliminates a significant amount of friction involved in the current data security practices. New technologies always sound complicated when they are first described. RSM works with companies like Unbound Technology to help clients understand and deploy the most secure data storage technologies. Sam Auch and Bennett Moore of RSM’s National Blockchain and Digital Assets Team, in collaboration with Unbound, has put together an in depth guide to MPC which can be found here and linked in the Talks & White Papers page.

Share this...
  • Reddit
  • Email
  • Facebook
  • Twitter
  • Linkedin

Sam Auch

Primary Sidebar

Categories

  • Defense
  • Forensics
  • Offense
  • Physical
  • R&D

Most Viewed Posts

  • DLL Injection Part 1: SetWindowsHookEx 10.8k views
  • Sophos UTM Home Edition – 3 – The Setup 10.8k views
  • Leveraging MS16-032 with PowerShell Empire 10k views
  • Bypassing Gmail’s Malicious Macro Signatures 9.8k views
  • How to Bypass SEP with Admin Access 8.9k views

Footer

  • RSS
  • Twitter
  • Tools
  • About
  • RSM US LLP

+1 800 903 6264

1 S Wacker Dr Suite 800
Chicago, IL 60606

Copyright © 2023 RSM US LLP. All rights reserved. RSM US LLP is a limited liability partnership and the U.S. member firm of RSM International, a global network of independent audit, tax and consulting firms. The member firms of RSM International collaborate to provide services to global clients, but are separate and distinct legal entities that cannot obligate each other. Each member firm is responsible only for its own acts and omissions, and not those of any other party. Visit for more information regarding RSM US LLP and RSM International.