About

„Every company should
train its own cryptologist“

For some, perhaps, a little over exaggerated statement. But in the world of communications and increasingly more endangered safety it is important to have access to professionals aware of interconnections and relations. A business may carefully chose communications protocols or architecture, but the effort may end up in vain: Wrong choice of methods will weaken protection, allow reading or modification of transferred data or may slow down

the system and waste your investment in infrastructure. It is critical to understand that your data or data of your customers is being transmitted via a public space and the only protection is a well selected cryptography. This training will help your understanding of these relationships and will carefully prepare your technicians for the requirements set by cyber security law.

For some, perhaps, a little over exaggerated statement. But in the world of communications and increasingly more endangered safety it is important to have access to professionals aware of interconnections and relations. A business may carefully chose communications protocols or architecture, but the effort may end up in vain: Wrong choice of methods will weaken protection, allow reading or modification of transferred data or may slow down the system and waste your investment in infrastructure. It is critical to understand that your data or data of your customers is being transmitted via a public space and the only protection is a well selected cryptography. This training will help your understanding of these relationships and will carefully prepare your technicians for the requirements set by cyber security law.

Scope

Training is presented in English, technicians are the target audience. The objective is to show
basic principles and methodologies for successful implementation of technology using cryptography.

Restriction of cryptography in the world, basic law related to
Terminology
Hash, principles and usage, algorithms and their security
Random number generators, importance and usage, classification
Asymmetric aka public key cryptography, pre and post-quantum algorithms, principles, comparison, speed
Comparison of most known/famous symmetric algorithms, their architecture, construction limits, differences between block and stream encryption algorithms
Standard encryption modes of first generation, modes AE and AEAD - third and fourth generations, disk encryption modes (tweaked mode)
Compare speed of most known algorithms
Implementation in hardware: ASIC/FPGA, Intel QuickAssist, CPU instructions, speed influence, comparison CPUs, disk encryption
Implementation in software: SSL layers, differences between SSL, TLS and STARTTLS, version changes, VPN Implementation
Authentication frames, MSCHAP, Kerberos and Schnorr algorithm
Hardening web servers, mail servers, DNS and OpenVPN
Applications in real life: GSM, WiFi, Bluetooth, NFC and RFID, SIM and EMV, 3D-Secure and another interesting applications
I want to register

Agenda

First day

08:00 - 09:00 Check in and Registration
09:00 - 10:00 Kryptology and limits in local law
10:00 - 13:00 Hashes, random number generators, asymmetric algorithms
13:00 - 14:00 Lunch
14:00 - 17:00 Symmetric algorithms, encryption modes, architecture of famous alogorithms and performance comparsion

Second day

08:00 - 09:00 Open discussion
09:00 - 10:00 Hardware implementation
10:00 - 13:00 Software implementation - SSL Layer
13:00 - 14:00 Lunch
14:00 - 15:00 Application hardening
15:00 - 17:00 Real life applications

Trainer

Jan Dušátko
Cryptologist
cryptosession.cz

Training has been be prepared in cooperation with:

Vlastimil Klíma
Cryptologist
cryptography.hyperlink.cz
Dominik Pantůček
Cryptologist trustica.cz
Tomáš Rosa, Ph.D.
Cryptologist
crypto.hyperlink.cz
Mgr. Pavel Vondruška
Cryptologist
cryptoworld.info/vondruska

Price

970 Eur*
*Price of training is without tax (1174 Eur with tax).

Registration / Contact

Registration for the training

Do you have a question?

Location

15th-16th May 2017
Quintessenz (detail)
MuseumsQuartier

Museumsplatz 1
1070 Wien

GPS: 48.2038908N
     16.3597483E
Car:
Parking at
Museumsplatz 1
Public transport:
Volkstheater,
Museumsquartier
or Burgring
Accomodation:
not covered

Partners

References