Tutorial Program Monday , August 31, PM Session | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Registration Program Committee Program at-a-Glance Tutorials at-a-Glance Tutorial Instructors Technical Sessions Tuesday, Sept. 1 Wednesday, Sept. 2 Thursday, Sept. 3 Activities and Services Hotel & Travel Info USENIX & SAGE Thank Supporting Members Student Discounts and Stipends |
M5pm
Cryptography for the Internet
half day program Bruce Schneier, Counterpane Systems Who should attend: Those who need to understand how cryptography is used over the Internet to secure communications, establish authenticity, and provide for integrity. This tutorial does not assume a strong background in mathematics. Security is essential for business and social interactions. The pre-computer world has developed many mechanisms to establish security: voice recognition on the telephone provides authentication, signatures on paper provide proof of intent, closed doors and walks in the park provide privacy, unforgeable currency provides fairness. As more businesses and social interactions move onto the Internet, the challenge is to mirror these techniques as much as possible in this new world. This tutorial will illustrate how cryptography can transform the Internet into a serious business tool by allowing for confidentiality, authentication, integrity, fairness, and much more. This tutorial will discuss the protocols to secure electronic mail, World Wide Web interactions, electronic commerce transactions, and other security measures the Internet community has developed. After completing this tutorial, participants will understand how cryptography is used on the Internet. Attendees will be able to vigorously debate the pros and cons of different systems for their own purposes. Topics covered include:
Bruce Schneier is president of Counterpane Systems, a cryptography and computer security consulting company. He is the author of Applied Cryptography (John Wiley & Sons), the seminal work in its field. Now in its second edition, Applied Cryptography has sold over 80,000 copies world-wide and has been translated into four languages. His papers have appeared at international conferences, and he has written dozens of articles on cryptography for major magazines. He designed the popular Blowfish encryption algorithm, still unbroken after years of cryptanalysis.
|
| ||
|
Workshop Index Events Calendar USENIX home |