An Introduction to Cryptography
An intensive practical overview
FREE 1 hour webinar Friday February 22 Register below
In this webinar we'll introduce the common building blocks, the cryptographic "primitives", used in the design of secure systems.
We will examine the evolution of the "Threat Landscape" from radio/telegraph transmissions through to the explosion of connected technology and how cryptography is developing to keep pace with the range and severity of modern threats to our embedded systems.
We'll look at cryptographic hash primitives, how data authenticity is established using digital signature primitives and also the main ideas underpinning public cryptography, such as RSA and Diffie-Hellman algorithms.
Beyond these well proven techniques we will look at the difficulties encountered when designing and implementing secure systems. Cryptographic primitives are seldom used directly, instead, a system design makes use of cryptographic protocols (combining primitives such as TLS or WPA).
We shall briefly look at recent issues illustrating the difficulties posed by cryptography, how they are solved and how the field is constantly evolving.
Doulos Senior Member Technical Staff, Adrian Thomasset will be broadcasting this training webinar, which will consist of a one-hour session, (see below for details) and will be interactive with Q&A participation from delegates.
Schedule and Registration:
This webinar has two broadcast times to be convenient for international audiences. Please review the times listed below and register for the most appropriate option for your time zone.For Europe and Asia
|If you have any queries, please contact email@example.com
Related training available NOW from Doulos:
|EMBEDDED SOFTWARE TRAINING:|
|Comprehensive Embedded Linux Security||More information / enquire »|
|Developing with Embedded Linux
||More information / enquire »|
|ARM and Embedded Software Training »|
|View full Doulos training schedule »|