Ccc brochure


Published on

Published in: Technology, Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Ccc brochure

  1. 1. Seminar on Contemporary Cryptography – Get comprehensive Cryptography-know-how in just one week!© 2009 InfoGuard | 091113_IG_CCC_A5_e Introduced by your trusted security partner.
  2. 2. Education in information security –made in Switzerland.
  3. 3. Education Services Contemporary Cryptography – Fundamentals and Applications Cryptography is a core security technology with many applications in communications and information sys- tems, electronic commerce and e-government in the emerging information society. Today every IT-professional needs basic knowledge in cryptography. This seminar provides an in-depth coverage of cryptography from a conceptual and application-oriented point of view. At the same time, the mathematical algorithmic and proto- col aspects are explained without necessarily requiring a deep background in / crypto Contemporary Cryptography | Page 1
  4. 4. Seminar on Contemporary CryptographyCrypto AG and its sister company InfoGuard AG Seminar dateshave jointly developed a 5 day education pro- The seminar dates can be found on the enclosed book-gramme for the needs of governmental information ing form or on our website: professionals. Seminar languageWho should attend EnglishDelegates from government and defence entities whoare responsible for initiating, implementing and main- Seminar locationtaining information security in their organisation. InfoGuard AG education centre, Zug/Switzerland.The seminar is open to everyone. On request it can be Seminar Certificateconducted as a private seminar on a date mutually Each participant becomes an InfoGuard Contemporaryagreeable. Please ask for further information. Cryptography Expert, and is awarded a formal certifi- cate.Page 2 | Contemporary Cryptography / crypto
  5. 5. Participants will receive introduction on all relevant topics with regard to a holistic approach to Contemporary Cryptography. Introduction and Overview not shared among the parties involved. More specifically, The seminar starts with a general introduction to crypto- it addresses one-way functions, asymmetric encryption logy. Different notions of security are introduced and systems, such as RSA, ElGamal, cryptographic hash func- various classes of cryptographic systems (cryptosystems) tions, such as MD5 and SHA-1 and digital signature sys- are overviewed, discussed and put into perspective on a tems. The module also elaborates on the fundamentals high level of abstraction. This module prepares the and basic principles of elliptic curve cryptography (ECC). grounds for the rest of the course. Crypto Security Architecture Secret Key Cryptography This module presents in particular the Crypto Security This module elaborates on secret key cryptography, i.e., Philosophy and Architecture. It helps participants to cryptosystems that employ secret parameters that are understand on how cryptography is being used in differ- shared among the parties involved. More specifically, it ent security solutions. addresses symmetric encryption systems, such as the Key Management and Applications Data Encryption Standard (DES), the Advanced Encryp- This module elaborates on key management (i.e., key tion Standard (AES), and the stream cipher RC4, mes- distribution and key establishment), public key infra- sage authentication systems, such as the HMAC con- structure (PKI), quantum cryptography, and cryptograph- struction, random and pseudorandom bit generators, as ic applications. Such applications include entity authenti- well as random and pseudorandom functions. cation and secure multi-party computation, as well as Public Key Cryptography more timely applications, such as Internet banking, This module elaborates on public key cryptography, i.e., e-government Internet voting and electronic payment cryptosystems that employ secret parameters that are / crypto Contemporary Cryptography | Page 3
  6. 6. Seminar AgendaArrivalIntroduction and Overview DAY 1Secret Key Cryptography DAY 2Public Key Cryptography DAY 3Crypto Security Architecture DAY 4Key Managementand Applications DAY 5DeparturePage 4 | Contemporary Cryptography / crypto
  7. 7. Days 1 Day 2 Day 4 Introduction and Overview Secret Key Cryptography Crypto Security Architecture • Cryptology • Symmetric encryption systems • Crypto Security Philosophy • Notions of security (unconditional (e.g., DES, AES, RC4, ... ) • Crypto Security Architecture vs. conditional security) • Message authentication systems • Security solutions • Cryptographic systems (classifica- (e.g., HMAC construction) tion and overview) • Random and pseudorandom bit Day 5 · Unkeyed cryptosystems generators Key Management and · Secret key cryptosystems • Random and Pseudorandom func- Applications · Public key cryptosystems tions • Key management • Public key infrastructure (PKI) Day 3 • Quantum cryptography Public Key Cryptography • Cryptographic applications • One-way functions · Entity authentication • Asymmetric encryption systems · Secure multi-party computation (e.g., RSA, ElGamal, Rabin, ... ) · Internet banking • Cryptographic hash functions · Remote Internet voting (e.g., MD5, SHA-1, ... ) · Electronic payment systems • Digital signature systems • Elliptic curve cryptography (ECC) / crypto Contemporary Cryptography | Page 5
  8. 8. Seminar environment Tutors The skill transfer is of high quality, both in terms of subject matter and tuition. In addition to their technical or scientific background, the tutors have many years of practical experience in their specialist fields with regard to information security and other ICT related areas. Their extensive social and cultural skills guarantee a congenial learning environment. Seminar methodology The seminar consists of know-how transfer sessions and discussions. Daily schedule 5 days Morning 9.00 – 12.00 h Monday to Friday Lunch 12.00 – 13.30 h Afternoon 13.30 – 16.30 h Accommodation Hotel booking can be arranged on request.Page 6 | Contemporary Cryptography / crypto
  9. 9. Terms and conditions Registration Alterations Please complete the registration form enclosed or online on • InfoGuard AG reserves the right to cancel the seminar due our website and fax to to an insufficient number of registrations. In such cases, +41 41 749 19 10 or mail to any registration fees already paid will be fully refunded. Your registration will be confirmed in writing. • It may become necessary for us to make alterations to the content, speakers, timing, venue or date of the event Cancellation compared to the advertised programme. • All cancellations must be submitted in writing. • Up to two weeks before the start of the seminar, 25% of Terms of Payment the registration fee will be charged for administration. • Payments are due within 10 days of the invoice date and • Up to one week before the start of the seminar, 50% of not later than the start of the seminar. the registration fee will be charged. • In the event of a registration at short notice, i.e. within • In the week before the start of the seminar, the full regis- one week, the person participating in the seminar may be tration fee will be charged. required to submit proof of payment or to pay cash prior • No charge will be made if another person participates in to the seminar start. the seminar on behalf of the absent participant. Place of Jurisdiction Substitutions/Name Changes • The place of jurisdiction is Zug, Switzerland If you are unable to attend you may nominate, in writing, another participant to take your place at any time prior to the start of the seminar. Two ore more participants may not «share» a place at a seminar. Please make separate bookings for each / crypto Contemporary Cryptography | Page 7
  10. 10. Enjoy your stay in SwitzerlandYour stay in Switzerland will be care- InfoGuard AG – Education in in-fully prepared. Learning will be made formation security «Made inmuch easier thanks to a pleasant Switzerland».atmosphere and interesting, exciting InfoGuard AG is the preferred edu-leisure time. During this five day cation provider for information secu-seminar we will organize a cultural rity. Its courses are geared to theouting. needs of governmental and military organizations as well as public ad-The small but lively town of Zug ministrations.(22’000 inhabitants) benefits frombeing close to the Swiss business Crypto AG – To Remainmetropolis of Zurich and its interna- Sovereign.tional airport, which is 35 kilometers We have developed, manufacturedaway. It is situated right by Lake Zug, and implemented custom security Baseland surrounded by typical Swiss hills Zurich Zug solutions for over 55 years. You tooand mountains. The region is an Berne Lucerne can rely on the expertise and capa-excellent starting point for excur- Geneva bilities of Crypto AG – just like oursions to the country’s most interest- Lugano customers in over 130 tourist attractions.Page 8 | Contemporary Cryptography / crypto
  11. 11. Designed and given InfoGuard AG Introduced by your Crypto AGby the sister company Feldstrasse 1 trusted security partner: P.O. Box 460of Crypto AG: CH-6300 Zug CH-6301 Zug/Switzerland Switzerland Phone +41 41 749 77 22 Phone +41 41 749 19 00 Fax +41 41 741 22 72 Fax +41 41 749 19 10
  12. 12. © 2009 InfoGuard | 091113_IG_CCC_A5_eA M E M B E R O F « T H E C RY P T O G R O U P »