This presentation covers the fundamentals of modern digital cryptography, including popular methods of encryption, hashing, and key exchange. Specific topics includeaes,sha,mac, Diffie-Hellman, andrsa. The mathematics behind primes, modulus, and elliptic curves is also covered.
Duration: 60 minutes, 75 minutes with questions
Tls/ssl forms the backbone of secure digital communication. This presentation covers the details about thetls protocol and its use of lower-level cryptographic methods. There is also an extensive section about the creation and use of digital certificates for authentication, with examples from web servers and Postgres. This can be presented after myFundamentals of Modern Cryptography presentation.
Duration: 60 minutes, 75 minutes with questions
Storing cryptographic keys is a big challenge in any digital encryption solution. This presentation explains how cryptographic hardware enables private key usage while preventing the keys from being viewed or copied. It focuses primarily on the configuration and features of Yubikey cryptographic hardware.
Duration: 60 minutes, 75 minutes with questions
Cryptographic hardware allows storage of keys which cannot be easily viewed or copied. This presentation explains how cryptographic hardware can be seamlessly accessed by applications includingopenssh,gpg, and Postgres. This can be presented after myCryptographic Hardware Configuration and Features presentation.
Duration: 60 minutes, 75 minutes with questions