Cryptographic Journey

Seminar Cynet

From Fundamentals to Quantum-safe algorithms

In the modern, digital world cryptography is an indispensable tool for protecting out systems and data. Without knowing we rely on it daily, be it to check our email, safely login to a computer, or drive a smart car, since the magic happens in the background, unseen. Yet, cryptographic algorithms keep changing and evolving all around us. Together we will take a look at the basics of different kinds of cryptographic algorithms, their present state, and where we are heading to in the future. 

What are we going to talk about?

You are kindly invited to join our series of four free webinars - here is what we are going to talk about in each webinar:

1. Introduction and Symmetric Cryptography (7 October 2021)

Best place to start are always the basics – what are the main goals of cryptography and which types of algorithms do we use to satisfy each of them? What is, arguably, the oldest type of encryption humanity has used, and why is a version of it still in use? What are its strong and weak points, and in which usecases can it be applied?

2. Asymmetric Cryptography (14 October 2021)

If we consider symmetric cryptography and its use to be relatively straightforward, asymmetric cryptography’s uses are more varied. From digital certificates to blockchain environment, from TLS key exchange to Internet of Things – the two most prominent asymmetric algorithms, RSA and its younger cousin ECC, are used everywhere.

3. The Many Uses of Cryptography (21 October 2021)

After understanding what symmetric and asymmetric cryptography is, we are probably starting to see that most applications demand a combination of both plus a few additional components. We will dig into real life usecases, look at the potential weaknesses, and consider some additional aspects that need to be covered in order for cryptography to function as intended.

4. Cryptography in the Future - PQC (28 October 2021)

Cryptographic protocols get broken. No protocol, no algorithm, has an infinite lifespan. At some point we will have to retire them. Migrations to new algorithms usually happen when either some new mathematical discovery is made, which enables a previously unknown attack on an algorithm, or when there is a significant advance in technology. In our (near) future we will be facing the potential of an attack mounted by a quantum computer. In response to this, Post Quantum Cryptography, PQC, is already being developed and in the following year we can expect NIST to publish the first PQC standards.

Webinar series details:

 Dates: Thursday, 7, 14, 21 and 28 October 2021
 Time: 13:00 – 14:00 CET 
  Language: English

About the speaker:

Nastja Cepak
Nastja Cepak, PhD,
Cryptographer, CREAplus

Nastja Cepak, PhD, leading Slovenian cryptographer, holds a PhD in cryptography related to symmetric cryptography and block ciphers. In recent years, she has begun to put her theoretical knowledge into practice at CREAplus, where she works with hardware cryptographic solutions such as hardware security module - HSM, encryption and public key infrastructure, and delivers technical trainings.

 

Need more information?

Please contact Mrs. Marjeta Zupancic from CREAplus at email This email address is being protected from spambots. You need JavaScript enabled to view it. or phone +386 590 74 270.

 

Registration:

Registration is closed.

News

What is the difference between a General Purpose and Payment HSM?

blockchainAlthough we do not give much thought to hardware security modules (HSMs), they are a critical element of security in an organisation’s IT infrastructure used for securing sensitive data.

Read more ...

Hardware Security Module (HSM) Explained

blockchainA hardware security module (HSM) is a small device that allows you to create, manage, and store cryptographic keys. They are considered one of the most secure ways to protect sensitive encrypted data.

Read more ...

The Role of HSMs in Public Key Infrastructure (PKI)

blockchainThe underlying hardware security modules (HSMs) in publick key infrastructure (PKI) are the root of trust which protect PKI from being breached. 

Read more ...

Providing a Secure Blockchain Through the Adoption of HSMs

blockchainThe strong cryptography provided by HSMs will become crucial to blockchain-based fintechs as they generate, store and protect the private and public keys that form the ‘root of trust’ in blockchains.

Read more ...

Hardening your AD FS servers with HSMs

adfssecMicrosoft provides best practices for the secure planning and deployment of Active Directory Federation Services (AD FS) and Web Application Proxy.

Read more ...