Introduction to Cryptography Training – Level 1

0 %
100 %
Information about Introduction to Cryptography Training – Level 1
Science-Technology

Published on July 22, 2018

Author: ecommerceexpertonlin

Source: authorstream.com

Slide 1: Price:  $1699.00 Length:  2 Days AES Advanced Encryption Standards   PKI Public Key Infrastructure CIA Confidentiality, Integrity, Availability CRYPTOGRAPHY TRAINING Introduction to LEVEL 1 Slide 2: Introduction to Cryptography Training – Level 1 https://www.tonex.com/training-courses/cryptography-training/ Introduction to  Cryptography Training Course Description – The TONEX cryptography training course introduces you to a variety of topics in cryptography such as: Information security and cryptography, stream and block ciphers, symmetric and asymmetric encryption, public key infrastructure (PKI) encryption, public key encryption, hash functions, digital signatures, and digital certificates. Cryptography is simply expressed as having the concept in a secret code. Such a definition will help the computer security to preserve the authentication, privacy, integrity and confidentiality of data. By taking the TONEX cryptography training, you will understand the main concept of cryptography, classification of ciphers, Stream ciphers, clock control generators, filter generators and combination generators. Moreover, you will learn about block ciphers, their modes of operation and advanced encryption standards (AES). Slide 3: Introduction to Cryptography Training – Level 1 https://www.tonex.com/training-courses/cryptography-training/ TONEX cryptography training course includes many in-class activities including hands on exercises, case studies and workshops. During the cryptography training, students bring in their own sample work and projects and through our coaching, develop their own cryptography framework. Learn about symmetric or private key encryption schemes, and different types of ciphers in this category such as permutation cipher, semantic security, security of CTR modes, entropy, symmetric key distribution and key management techniques. Learn about the asymmetric encryption concepts, notations of security, and hybrid encryption. Furthermore, understand the importance of public key crypto, certificate authority, roles of computer security and confidentiality, integrity, availability (CIA). Learn the principles of public key encryption such as: RSA public key encryption, Rabin public key encryption, probabilistic public key encryption, factoring algorithms, discrete algorithms, key exchange and finite field arithmetic in public key encryption. By taking this course you will also learn about the hash functions and data integrity topics, general classification of hash functions, iterated hash functions, keyed hash functions (MACs) and un-keyed hash functions (MDCs). Slide 4: Introduction to Cryptography Training – Level 1 https://www.tonex.com/training-courses/cryptography-training/ Audience The cryptography training is a 2-day course designed for: All individuals who need to understand the concept of cryptography. IT professionals in the areas of software security and cryptography Cyber security professionals, network engineers, security analysts, policy analysts Security operation personnel, network administrators, system integrators and security consultants Security traders to understand the software security of web system, mobile devices, or other devices. Investors and contractors who plan to make investments in security system industry. Technicians, operators, and maintenance personnel who are or will be working on cyber security projects Managers, accountants, and executives of cyber security industry. If you are an IT professional who specialize in system security, you will benefit the presentations, examples, case studies, discussions, and individual activities upon the completion of Cryptography training and will prepare yourself for your career. Slide 5: Introduction to Cryptography Training – Level 1 https://www.tonex.com/training-courses/cryptography-training/ Training Objectives Upon completion of the cryptography training course, the attendees are able to: Learn the concept of cryptography and basic terminologies related to key encryption Explain different types of ciphers, their classification, and operation principles Differentiate the symmetric and asymmetric key encryption Explain the concept of public key infrastructure and cryptographic tools Understand the public key encryption, different types of public key encryption algorithms, and their operation principles Describe hash functions, keyed hash functions (MACs) and un-keyed hash functions (MDCs) Understand the digital signatures, digital certificates and protection against threats Recognize the cryptographic threats and tools to mitigate them Slide 6: Introduction to Cryptography Training – Level 1 https://www.tonex.com/training-courses/cryptography-training/ Training Outline The cryptography training course consists of the following lessons, which can be revised and tailored to the client’s need: Introduction to Cryptography Stream Ciphers Block Ciphers Symmetric (Private Key) Encryption Asymmetric Encryption Main Aspects of Cryptography: PKI and Encryption Public Key Encryption Hash Functions and Data Integrity Digital Signature GPG Digital Certificate Cryptographic Threats and Tools Hands-on and In-Class Activities Sample Workshops Labs for Cryptography Training Slide 7: Introduction to Cryptography Training – Level 1 https://www.tonex.com/training-courses/cryptography-training/ Introduction to Cryptography Information security and cryptography Backgrounds and functions Basic terminology and concepts Symmetric key encryption Digital signatures Authentication and identification Public key cryptography Hash functions Key establishment, management, and certification Classes of attacks and security models Slide 8: Introduction to Cryptography Training – Level 1 https://www.tonex.com/training-courses/cryptography-training/ Stream Ciphers Introduction to stream ciphers Classification of ciphers Feedback shift registers Linear feedback shift registers Complexitiy of linear feedback shift registers Berlekamp-Massery algorithm Nonlinear feedback shift registers Stream ciphers Clock control generators Nonlinear filter generators Combination generators (non-linear) Slide 9: Introduction to Cryptography Training – Level 1 https://www.tonex.com/training-courses/cryptography-training/ Block Ciphers Introduction to block ciphers Modes of operation Exhaustive key search and multiple encryptions Classical ciphers and historical development Transposition ciphers Substitution ciphers Polyalphabetic ciphers Cryptanalysis of classical ciphers Advanced encryption standards (AES) Data Encryption standard (DES) Product ciphers and Feistel ciphers DES algorithm DES properties Iterated DES and DESX FEAL IDEA Limitation of key recovery based security Slide 10: Introduction to Cryptography Training – Level 1 https://www.tonex.com/training-courses/cryptography-training/ Symmetric (Private Key) Encryption Symmetric encryption schemes Historical ciphers Shift cipher Sunstation cipher Vigenere cipher Permutation cipher Issues in privacy Semantic security Security of CTR modes The enigma machine Information theoretic security Probability and ciphers Entropy Historical stream ciphers Modern stream ciphers Block ciphers Symmetric key distribution Key management Secret key distribution Formal approaches to protocol checking Message authentication codes Slide 11: Introduction to Cryptography Training – Level 1 https://www.tonex.com/training-courses/cryptography-training/ Asymmetric Encryption Asymmetric encryption schemes Notions of security Hybrid encryption ElGamal scheme Slide 12: Introduction to Cryptography Training – Level 1 https://www.tonex.com/training-courses/cryptography-training/ Main Aspects of Cryptography: PKI and Encryption Concept of public key infrastructure (PKI) Basic definitions before PKI Public key crypto Certificate Certificate authority Relationship between PKI and basic terms Roles of computer security CIA (confidentiality, integrity, availability) Cryptographic tools Hash functions Secret key cryptography Slide 13: Introduction to Cryptography Training – Level 1 https://www.tonex.com/training-courses/cryptography-training/ Public Key Encryption Introduction Public key cryptography Basic principles of public key encryption RSA public key encryption, Security of RSA Rabin public key encryption ElGamal public key encryption McEliece public key encryption Knapsack public key encryption Probabilistic public key encryption Merkle-Hellman knapsack encryption Chor-Rivest knapsack encryption Goldwasser-Micali probabilistic encryption Slide 14: Introduction to Cryptography Training – Level 1 https://www.tonex.com/training-courses/cryptography-training/ Hash Functions and Data Integrity Introduction to hash functions Classification of hash functions General classification Basic properties of hash functions Iterated hash functions Formatting and initialization of hash functions Bit sizes required for hash functions Un-keyed hash functions (MDCs) Hash functions based on block ciphers Hash functions based on modular arithmetic Keyed hash functions (MACs) MACs based on block ciphers Customized MACs MAC for stream ciphers Data integrity and message authentication Malicious threats to data integrity Data integrity using MAC Data integrity using MDC and authentic channel Data integrity combined with encryption Attacks on hash functions Birthday attack, Pseudo-collisions & Chaining attacks Slide 15: Introduction to Cryptography Training – Level 1 https://www.tonex.com/training-courses/cryptography-training/ Digital Signature Introduction to digital signatures Basic definition Digital signature schemes Types of attacks on signature schemes RSA and related signature schemes Possible attacks on RSA signature The Rabin public key signature scheme ISO/IEC 9796 formatting Fait-Shamir signature schemes DSA and related signature schemes GQ signature scheme Digital signature algorithm (DSA) ElGamal signature scheme Schnorr signature scheme One time digital signatures Rabin one-time signature scheme Merkle one time signature scheme GMR one-time signature scheme Arbitrated digital signatures ESIGN Signatures with additional functionality Fail-stop signature scheme & Blind signature scheme Slide 16: Introduction to Cryptography Training – Level 1 https://www.tonex.com/training-courses/cryptography-training/ GPG Overview of GPG Commands and CLI GPG trust model GUI – KGPG, Seahorse Frontends – Kleopatra , enigmail 2 Digital Certificate Definition of digital certificate CA’s identity Owner’s identity Owner’s public key Certificate expiration date CA’s signature for certificate Types of digital certificate Identity certificates Accreditation certificates Authorization and permission certificates Parties to digital certificate Public and private keys Certificate validation X509 certificate Third party digital signature certification authorities and more. Slide 17: Introduction to Cryptography Training – Level 1 https://www.tonex.com/training-courses/cryptography-training/ Cryptographic Threats and Tools Impersonation Pretend to be someone else to gain access to information or services Lack of secrecy Eavesdrop on data over network Corruption Modify data over network Break-ins Take advantage of implementation bugs Denial of Service Flood resource to deny use from legitimate users Firewalls Filtering “dangerous” traffic at a middle point in the network Network level security (e.g. IPsec ) Host-to-host encryption and authentication Providing security without application knowledge Application level security True end-to-end security Extra effort per application Libraries help, like SSL/TLS Slide 18: Introduction to Cryptography Training – Level 1 https://www.tonex.com/training-courses/cryptography-training/ Hands-on and In-Class Activities Labs Workshops Group Activities Sample Workshops Labs for Cryptography Training Encryption using binary/byte addition Encryption using binary Exclusive-OR (XOR) Diffie -Hellman key exchange and symmetric key cryptography Triple DES with CBC mode and Weak DES keys RSA Encryption and Factorization Attacks Attack test on RSA encryption with short RSA modulus Introduction to Hash generation and sensitivity of hash functions Digital Signature Visualization RSA Signature How to generate your RSA public and private keys. Attack test on Digital Signature/Hash Collision #HASH FUNCTIONS Slide 19: Price:  $1699.00 Length:  2 Days AES Advanced Encryption Standards   PKI Public Key Infrastructure CIA Confidentiality, Integrity, Availability CRYPTOGRAPHY TRAINING Introduction to LEVEL 1 VISIT TONEX.COM Slide 20: https://www.tonex.com/

#hash presentations

Add a comment

Related presentations