Tutorial Program Monday, August 31, AM Session | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Registration Program Committee Program at-a-Glance Tutorials at-a-Glance Tutorial Instructors Technical Sessions Tuesday, Sept. 1 Wednesday, Sept. 2 Thursday, Sept. 3 Activities and Services Hotel & Travel Info USENIX & SAGE Thank Supporting Members Student Discounts and Stipends |
![]() |
M2am
Using Cryptography
half day program Bruce Schneier, Counterpane Systems Who should attend: Those who need to understand cryptography and want to gain an understanding of what it does and how it works. This tutorial does not assume a strong background in mathematics. Cryptography encompasses encryption, digital signatures, electronic commerce and secure voting. Cryptography has enabled technology to enhance existing business and social constructs, moving them towards computer networks. Good cryptography is imperative, as security can only be as strong as the weakest component. There is a lot of bad cryptography that looks good. This tutorial will give you the expertise to tell the difference. We will examine cryptography as it is used in the real world: the algorithms, the protocols, and the implementations. We will stress the "whats" and the "hows," rather than the "whys." After completing this tutorial, participants will be intelligent consumers of cryptography. Attendees will understand cryptography's building blocks, how those building blocks are put together to make cryptographic system, and what the limitations of the science are. Topics covered include:
![]() |
| ||
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() |