T4PM
Cryptography for the Internet
Bruce Schneier, Counterpane Systems
Who should attend:
Those who need to understand how cryptography is used over the Internet to secure communications, establish authenticity, and provide for integrity. I stress the engineering discipline, and do not assume a strong background in mathematics.
Security is essential for business and social interactions, and the pre-computer world has developed many techniques to establish security: voice recognition on the telephone provides authentication, signatures on paper provide proof of intent, closed doors and walks in the park provide privacy, unforgeable currency provides for fairness. As more and more business and social interactions move onto the Internet, the challenge is to mirror these techniques as much as possible in this new world.
This tutorial shows how cryptography can help. By allowing for confidentiality, authentication, integrity, fairness, and many other things, cryptography can transform the Internet into a serious business tool. The Internet community has developed protocols to secure electronic mail, World Wide Web interactions, electronic commerce transactions, etc., which you will learn about.
After completing this tutorial, you will understand how cryptography is currently used on the Internet. You will be able to vigorously debate the pros and cons of different systems, and cause commotions at IETF meetings.
Topics include:
|
Cryptography in a networked world
|
|
Tools of Internet cryptography
|
|
Threat modeling
|
|
Email security: PGP, S/MIME
|
|
Trust management: X.509, SDSI, SPKI
|
|
IP security
|
|
World Wide Web security
|
|
Electronic commerce: Cybercash, Digicash, First Virtual, SET
|
Bruce Schneier
is president of Counterpane Systems, a cryptography and computer security consulting company. He is the author of Applied Cryptography, the seminal work in its field. He has written dozens of articles on cryptography for major magazines and designed the popular Blowfish encryption algorithm, still unbroken after years of cryptanalysis.
Tutorials at-a-Glance Symposium Speakers
|