|
M5
Real World Applications of Cryptography New Greg Rose, QUALCOMM Australia Who should attend: System, network, and security administrators; people who communicate remotely and require security; developers of applications which require authentication or privacy; managers who need to better understand what is and is not possible. While cryptography is becoming increasingly important, and cryptographic algorithms are well understood, the problem is that actually using cryptography (either embedded in day-to-day applications or developing new "crypto-enabled" applications) is hard. In this tutorial, you will gain an understanding of the capabilities of cryptographic techniques, some of the common pitfalls in their use, and some of the techniques for successfully using cryptography in applications. After completing this tutorial, participants will know many of the tricks of successfully using cryptography in their work or applications. Topics will include:
Greg Rose's work at QUALCOMM focuses on cryptographic security and authentication for wireless communications, particularly mobile phones. Has written a number of public tools using cryptography and holds generic cryptographic export licenses for two countries. He was the program chair for the 1996 USENIX Security Symposium and is a USENIX board member. |
| ||
|
Conference Index Events Calendar USENIX home |