Check out the new USENIX Web site.  3rd USENIX Workshop on
Electronic Commerce, - August 31- September 3, 1998, - The
Tremont Hotel, Boston, Massachusetts
 
 
Tutorial Program   Monday, August 31, AM Session
 
Registration


Program Committee


Program at-a-Glance


Tutorials at-a-Glance
 
 Tutorial Instructors


Technical
Sessions

 
 Tuesday, Sept. 1
 
 Wednesday, Sept. 2
 
 Thursday, Sept. 3



Activities and Services


Hotel & Travel Info


USENIX & SAGE Thank Supporting Members


Student Discounts and Stipends

M2am   Using Cryptography   half day program
Bruce Schneier, Counterpane Systems

Who should attend: Those who need to understand cryptography and want to gain an understanding of what it does and how it works. This tutorial does not assume a strong background in mathematics.

Cryptography encompasses encryption, digital signatures, electronic commerce and secure voting. Cryptography has enabled technology to enhance existing business and social constructs, moving them towards computer networks. Good cryptography is imperative, as security can only be as strong as the weakest component. There is a lot of bad cryptography that looks good. This tutorial will give you the expertise to tell the difference.

We will examine cryptography as it is used in the real world: the algorithms, the protocols, and the implementations. We will stress the "whats" and the "hows," rather than the "whys." After completing this tutorial, participants will be intelligent consumers of cryptography. Attendees will understand cryptography's building blocks, how those building blocks are put together to make cryptographic system, and what the limitations of the science are.

Topics covered include:

-    Basics of Cryptography
-    Symmetric Cryptography: DES, triple-DES, IDEA, Blowfish, RC2, RC4, RC5, AES
-    Public-key Cryptography: Encryption and digital signatures, RSA, Diffie-Hellman, ElGamal, DSA
-    Hash Functions and Message Authentication Codes: MD4, MD5, SHA, CBC-MAC, HMAC, NMAC
-    Random Number Generation
-    Protocols: key exchange, authentication, secret sharing, key escrow, certificates, digital cash
-    What cryptography can do for you
-    What cryptography can't do for you

 


Bruce Schneier   is president of Counterpane Systems, a cryptography and computer security consulting company. He is the author of Applied Cryptography (John Wiley & Sons), the seminal work in its field. Now in its second edition, Applied Cryptography has sold over 80,000 copies world-wide and has been translated into four languages. His papers have appeared at international conferences, and he has written dozens of articles on cryptography for major magazines. He designed the popular Blowfish encryption algorithm, still unbroken after years of cryptanalysis.
 


Program at-a-Glance -   Tutorials -   Technical Program -   Registration -
Conference Activities -   Hotel & Travel Info -   Program Committee -   Conference Brochure Home
    Workshop Index
   Events Calendar
   USENIX home