Smart University Home Programs > Recent Developments in Applied Cryptology
Embedded Devices
1 Day
Sophia, Lund
Recent Developments in Applied Cryptology
Cryptographic algorithms and protocol form the core of secure information systems. While most attacks on systems bypass the cryptography, weak cryptographic algorithms and protocols can have dramatic implications. Cryptography as an academic discipline is becoming mature (35 years). Every year more than 600 reviewed articles are published in cryptology, amounting to more than 10,000 pages. Every week a conference is held with a session on cryptography.
The goal of this module is to keep you up to date with the recent developments in applied cryptography and with the trends for the future. We select out of this growing mountain of information the gems that may matter to practitioners. We will cover developments in block ciphers (How serious are the related key attacks on AES and KASUMI? Should I worry about attacks on Keeloq?), stream ciphers (What happened to the results of the eSTREAM competition and the Mifare issues), hash functions (the MD5 disaster and the SHA-3 competition), MAC algorithms (Which of the 77 variants of CBC-MAC to use, or should I switch to GCM?), public key algorithms (progress in factoring, the latest attacks on RSA alternatives to RSA, progress of ECC). We will also revisit the progress in key management (the TLS renegotiation attack) and entity authentication protocols, key generation and a overview of implementation issues. We will conclude with a summary of hot topics such as whitebox cryptography, pairings and lattices.

Training's objectives
The goal is to present non-experts with an overview of the developments in applied cryptology; the focus is on the selected developments that do matter for practitioners. We expect familiarity with the basic concepts of cryptography (a short article with the required background can be provided upon request to prepare for the course). We require no background knowledge of mathematics; there will only be a few slides with formulas. We will offer clear recommendations that can be applied in practice.

Who should attend?
IT developers and architects, Security/IT managers, project managers, researchers and academics.

Key topics
Applied cryptography - cryptanalysis - how to use cryptography well

9.00 - 10.45 am
Symmetric cryptography
- Block ciphers (DES, 3-DES, AES, Keeloq, KATAN, modes of operation)
- MAC algorithms and hash functions (CBC-MAC, HMAC, UMAC)
- Authenticated encryption (CCM, GCM, OCB)

11.00 - 12.30 pm
Public key cryptography
- How to use RSA? (PKCS#1, RSA KEM-DEM, RSA-PSS, ISO 9796)
- ECC and HECC versus RSA
- NTRU and lattices
- Pairings

2.00 - 3.30 pm
Key establishment and key generation
- Entity authentication and key establishment: state of the art
- Subtle protocol flaws: learning by example (such as the TLS renegotiation attack)

3.45 - 5.00 pm
How to use cryptography well and a discussion of hot topics
- Key management architectures
- Security APIs
- Random Number Generation
- Whitebox Cryptography


Module designed and coordinated by Bart Preneel and Vincent Rijmen, professors at the Katholieke Universiteit Leuven (Belgium)
View the new program
From €240 (excl. vat)

  To register

Enter the password in the field below and click on the button to validate.


Password lost? more