Description
This course presents the different cryptographic techniques as well as the main applications. Symmetric and asymmetric encryption, hashing, the most used algorithms as well as key management methods will be explained in detail.
Who is this training for ?
For whom ?
Security managers, developers, project managers.
Prerequisites
No special knowledge.
Training objectives
Training program
- Introduction
- History of the first encrypted documents.
- Cryptographic services.
- Mathematical concepts.
- Cryptographic security and attack techniques.
- Stream Ciphers
- Presentation of the concept.
- Linear Feedback Stream Register (LFSR): operational details, Galois LFSR, applications.
- Other forms of stream encryption: RC4, SEAL.
- Block Ciphers
- Presentation of the concept.
- The different forms: Electronic CodeBook (ECB), Cipher-Bloc Chaining (CBC), Cipher FeedBack (CFB).
- Comparison of stream and block ciphers.
- Data Encryption Standard (DES).
- Triple DES (3DES): presentation, operating modes.
- Advanced Encryption Standard ( AES).
- Additional algorithms: IDEA, RC5, SAFER.
- Asymmetric encryption
- The RSA algorithm in detail.
- Security and key size.
- RSA attacks and challenge.
- Practical applications.
- ElGamel encryption.
- ElGamel in DSA.
- Hash functions
- Concept and objectives.
- Algorithmic principles.
- Mathematical properties.
- Practical justifications for the different properties.
- Security and hash length.
- Simple (Unkeyed) and secure (Keyed) hashing: block encryption. MD4 function.
- Advanced attacks on hash functions.
- Technical overview of hash functions: SHA-1,SHA-256 and SHA-512.MD5.Haval.
- RIPEMD-128.
- Integrity and authentication
- Presentation.Standards CBC-MAC.HMAC.
- Electronic signature.D.S.A and R.S.A signature.
- Key management
- Key exchange with symmetric and asymmetric encryption.
- Details of exchanges.
- Diffie-Hellman algorithm.
- Attack of man in the middle.
- Management and certification of public keys.
- Revocation, renewal and archiving of keys.
- Certificates in X509 format, PKIX standard.
- The key management infrastructure (KMI/PKI).
- Trusted third parties
- Presentation and standards.Architectures.
- Certification authority.Kerberos.