Unlock the potential of generative AI across all your managerial functions.
Log in
Or create your account
You have just added to your selection
Your cart is empty, See our trainings

Description

This course presents the different cryptographic techniques as well as the main applications. Symmetric and asymmetric encryption, hashing, the most used algorithms as well as key management methods will be explained in detail.

Who is this training for ?

For whom ?

Security managers, developers, project managers.

Prerequisites

No special knowledge.

Training objectives

  • Master the vocabulary associated with cryptology: algorithm, hashing, key Know the most used algorithms in cryptology Identify methods of exchange, management and certification of public keys Use symmetric and asymmetric encryption tools
  • Training program

      • History of the first encrypted documents.
      • Cryptographic services.
      • Mathematical concepts.
      • Cryptographic security and attack techniques.
      • Presentation of the concept.
      • Linear Feedback Stream Register (LFSR): operational details, Galois LFSR, applications.
      • Other forms of stream encryption: RC4, SEAL.
      • Presentation of the concept.
      • The different forms: Electronic CodeBook (ECB), Cipher-Bloc Chaining (CBC), Cipher FeedBack (CFB).
      • Comparison of stream and block ciphers.
      • Data Encryption Standard (DES).
      • Triple DES (3DES): presentation, operating modes.
      • Advanced Encryption Standard ( AES).
      • Additional algorithms: IDEA, RC5, SAFER.
      • The RSA algorithm in detail.
      • Security and key size.
      • RSA attacks and challenge.
      • Practical applications.
      • ElGamel encryption.
      • ElGamel in DSA.
      • Concept and objectives.
      • Algorithmic principles.
      • Mathematical properties.
      • Practical justifications for the different properties.
      • Security and hash length.
      • Simple (Unkeyed) and secure (Keyed) hashing: block encryption. MD4 function.
      • Advanced attacks on hash functions.
      • Technical overview of hash functions: SHA-1,SHA-256 and SHA-512.MD5.Haval.
      • RIPEMD-128.
      • Presentation.Standards CBC-MAC.HMAC.
      • Electronic signature.D.S.A and R.S.A signature.
      • Key exchange with symmetric and asymmetric encryption.
      • Details of exchanges.
      • Diffie-Hellman algorithm.
      • Attack of man in the middle.
      • Management and certification of public keys.
      • Revocation, renewal and archiving of keys.
      • Certificates in X509 format, PKIX standard.
      • The key management infrastructure (KMI/PKI).
      • Presentation and standards.Architectures.
      • Certification authority.Kerberos.
    • 1116
    • 21 h

    Submit your review

    Translated By Google Translate