An Introduction to Cryptography
An intensive practical overview
The webinar has ended - sorry you missed it! To keep up to date with the latest training webinars sign up for Doulos emails
In this webinar we'll introduce the common building blocks, the cryptographic "primitives", used in the design of secure systems.
We will examine the evolution of the "Threat Landscape" from radio/telegraph transmissions through to the explosion of connected technology and how cryptography is developing to keep pace with the range and severity of modern threats to our embedded systems.
We'll look at cryptographic hash primitives, how data authenticity is established using digital signature primitives and also the main ideas underpinning public cryptography, such as RSA and Diffie-Hellman algorithms.
Beyond these well proven techniques we will look at the difficulties encountered when designing and implementing secure systems. Cryptographic primitives are seldom used directly, instead, a system design makes use of cryptographic protocols (combining primitives such as TLS or WPA).
We shall briefly look at recent issues illustrating the difficulties posed by cryptography, how they are solved and how the field is constantly evolving.
Doulos Senior Member Technical Staff, Adrian Thomasset will be broadcasting this training webinar, which will consist of a one-hour session, (see below for details) and will be interactive with Q&A participation from delegates.
|If you have any queries, please contact firstname.lastname@example.org
Related training available NOW from Doulos:
|EMBEDDED SOFTWARE TRAINING:|
|Comprehensive Embedded Linux Security||More information / enquire »|
|Developing with Embedded Linux
||More information / enquire »|
|ARM and Embedded Software Training »|
|View full Doulos training schedule »|