Introduction

Threats to successful key management can be grouped into two categories: threats from malicious actors and threats that come from the inherent complexity of key storage itself. The following is a non-exhaustive list of specific threats that we considered in the design of our Keymaster systems.