Tutorial Program Monday, August 31, AM Session | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Registration Program Committee Program at-a-Glance Tutorials at-a-Glance Tutorial Instructors Technical Sessions Tuesday, Sept. 1 Wednesday, Sept. 2 Thursday, Sept. 3 Activities and Services Hotel & Travel Info USENIX & SAGE Thank Supporting Members Student Discounts and Stipends |
M2am
Using Cryptography
half day program Bruce Schneier, Counterpane Systems Who should attend: Those who need to understand cryptography and want to gain an understanding of what it does and how it works. This tutorial does not assume a strong background in mathematics. Cryptography encompasses encryption, digital signatures, electronic commerce and secure voting. Cryptography has enabled technology to enhance existing business and social constructs, moving them towards computer networks. Good cryptography is imperative, as security can only be as strong as the weakest component. There is a lot of bad cryptography that looks good. This tutorial will give you the expertise to tell the difference. We will examine cryptography as it is used in the real world: the algorithms, the protocols, and the implementations. We will stress the "whats" and the "hows," rather than the "whys." After completing this tutorial, participants will be intelligent consumers of cryptography. Attendees will understand cryptography's building blocks, how those building blocks are put together to make cryptographic system, and what the limitations of the science are. Topics covered include:
Bruce Schneier is president of Counterpane Systems, a cryptography and computer security consulting company. He is the author of Applied Cryptography (John Wiley & Sons), the seminal work in its field. Now in its second edition, Applied Cryptography has sold over 80,000 copies world-wide and has been translated into four languages. His papers have appeared at international conferences, and he has written dozens of articles on cryptography for major magazines. He designed the popular Blowfish encryption algorithm, still unbroken after years of cryptanalysis. |
| ||
|
Workshop Index Events Calendar USENIX home |