In the modern, digital world cryptography is an indispensable tool for protecting out systems and data. Without knowing we rely on it daily, be it to check our email, safely login to a computer, or drive a smart car, since the magic happens in the background, unseen. Yet, cryptographic algorithms keep changing and evolving all around us. Together we will take a look at the basics of different kinds of cryptographic algorithms, their present state, and where we are heading to in the future.
What are we going to talk about?
You are kindly invited to join our series of four free webinars - here is what we are going to talk about in each webinar:
1. Introduction and Symmetric Cryptography (7 October 2021)
Best place to start are always the basics – what are the main goals of cryptography and which types of algorithms do we use to satisfy each of them? What is, arguably, the oldest type of encryption humanity has used, and why is a version of it still in use? What are its strong and weak points, and in which usecases can it be applied?
2. Asymmetric Cryptography (14 October 2021)
If we consider symmetric cryptography and its use to be relatively straightforward, asymmetric cryptography’s uses are more varied. From digital certificates to blockchain environment, from TLS key exchange to Internet of Things – the two most prominent asymmetric algorithms, RSA and its younger cousin ECC, are used everywhere.
3. The Many Uses of Cryptography (21 October 2021)
After understanding what symmetric and asymmetric cryptography is, we are probably starting to see that most applications demand a combination of both plus a few additional components. We will dig into real life usecases, look at the potential weaknesses, and consider some additional aspects that need to be covered in order for cryptography to function as intended.
4. Cryptography in the Future - PQC (28 October 2021)
Cryptographic protocols get broken. No protocol, no algorithm, has an infinite lifespan. At some point we will have to retire them. Migrations to new algorithms usually happen when either some new mathematical discovery is made, which enables a previously unknown attack on an algorithm, or when there is a significant advance in technology. In our (near) future we will be facing the potential of an attack mounted by a quantum computer. In response to this, Post Quantum Cryptography, PQC, is already being developed and in the following year we can expect NIST to publish the first PQC standards.
Webinar series details:
Dates: Thursday, 7, 14, 21 and 28 October 2021
Time: 13:00 – 14:00 CET
Language: English
About the speaker:
Nastja Cepak, PhD, leading Slovenian cryptographer, holds a PhD in cryptography related to symmetric cryptography and block ciphers. In recent years, she has begun to put her theoretical knowledge into practice at CREAplus, where she works with hardware cryptographic solutions such as hardware security module - HSM, encryption and public key infrastructure, and delivers technical trainings.
Need more information?
Please contact Mrs. Marjeta Zupancic from CREAplus at email
Registration:
Registration is closed.
Page 10 of 12