3. Education Services
Contemporary Cryptography – Fundamentals and Applications
Cryptography is a core security technology with many
applications in communications and information sys-
tems, electronic commerce and e-government in the
emerging information society. Today every IT-professional
needs basic knowledge in cryptography. This seminar
provides an in-depth coverage of cryptography from a
conceptual and application-oriented point of view. At
the same time, the mathematical algorithmic and proto-
col aspects are explained without necessarily requiring a
deep background in mathematics.
www.infoguard.ch / crypto Contemporary Cryptography | Page 1
4. Seminar on Contemporary Cryptography
Crypto AG and its sister company InfoGuard AG Seminar dates
have jointly developed a 5 day education pro- The seminar dates can be found on the enclosed book-
gramme for the needs of governmental information ing form or on our website: www.infoguard.ch/crypto/
security professionals.
Seminar language
Who should attend English
Delegates from government and defence entities who
are responsible for initiating, implementing and main- Seminar location
taining information security in their organisation. InfoGuard AG education centre, Zug/Switzerland.
The seminar is open to everyone. On request it can be Seminar Certificate
conducted as a private seminar on a date mutually Each participant becomes an InfoGuard Contemporary
agreeable. Please ask for further information. Cryptography Expert, and is awarded a formal certifi-
cate.
Page 2 | Contemporary Cryptography www.infoguard.ch / crypto
5. Participants will receive introduction on all relevant topics with
regard to a holistic approach to Contemporary Cryptography.
Introduction and Overview not shared among the parties involved. More specifically,
The seminar starts with a general introduction to crypto- it addresses one-way functions, asymmetric encryption
logy. Different notions of security are introduced and systems, such as RSA, ElGamal, cryptographic hash func-
various classes of cryptographic systems (cryptosystems) tions, such as MD5 and SHA-1 and digital signature sys-
are overviewed, discussed and put into perspective on a tems. The module also elaborates on the fundamentals
high level of abstraction. This module prepares the and basic principles of elliptic curve cryptography (ECC).
grounds for the rest of the course.
Crypto Security Architecture
Secret Key Cryptography This module presents in particular the Crypto Security
This module elaborates on secret key cryptography, i.e., Philosophy and Architecture. It helps participants to
cryptosystems that employ secret parameters that are understand on how cryptography is being used in differ-
shared among the parties involved. More specifically, it ent security solutions.
addresses symmetric encryption systems, such as the
Key Management and Applications
Data Encryption Standard (DES), the Advanced Encryp-
This module elaborates on key management (i.e., key
tion Standard (AES), and the stream cipher RC4, mes-
distribution and key establishment), public key infra-
sage authentication systems, such as the HMAC con-
structure (PKI), quantum cryptography, and cryptograph-
struction, random and pseudorandom bit generators, as
ic applications. Such applications include entity authenti-
well as random and pseudorandom functions.
cation and secure multi-party computation, as well as
Public Key Cryptography more timely applications, such as Internet banking,
This module elaborates on public key cryptography, i.e., e-government Internet voting and electronic payment
cryptosystems that employ secret parameters that are systems.
www.infoguard.ch / crypto Contemporary Cryptography | Page 3
6. Seminar Agenda
Arrival
Introduction and Overview
DAY 1
Secret Key Cryptography
DAY 2
Public Key Cryptography
DAY 3
Crypto Security Architecture
DAY 4
Key Management
and Applications
DAY 5
Departure
Page 4 | Contemporary Cryptography www.infoguard.ch / crypto
7. Days 1 Day 2 Day 4
Introduction and Overview Secret Key Cryptography Crypto Security Architecture
• Cryptology • Symmetric encryption systems • Crypto Security Philosophy
• Notions of security (unconditional (e.g., DES, AES, RC4, ... ) • Crypto Security Architecture
vs. conditional security) • Message authentication systems • Security solutions
• Cryptographic systems (classifica- (e.g., HMAC construction)
tion and overview) • Random and pseudorandom bit Day 5
· Unkeyed cryptosystems generators Key Management and
· Secret key cryptosystems • Random and Pseudorandom func- Applications
· Public key cryptosystems tions • Key management
• Public key infrastructure (PKI)
Day 3 • Quantum cryptography
Public Key Cryptography • Cryptographic applications
• One-way functions · Entity authentication
• Asymmetric encryption systems · Secure multi-party computation
(e.g., RSA, ElGamal, Rabin, ... ) · Internet banking
• Cryptographic hash functions · Remote Internet voting
(e.g., MD5, SHA-1, ... ) · Electronic payment systems
• Digital signature systems
• Elliptic curve cryptography (ECC)
www.infoguard.ch / crypto Contemporary Cryptography | Page 5
8. Seminar environment
Tutors
The skill transfer is of high quality, both in terms of
subject matter and tuition. In addition to their technical
or scientific background, the tutors have many years of
practical experience in their specialist fields with regard
to information security and other ICT related areas. Their
extensive social and cultural skills guarantee a congenial
learning environment.
Seminar methodology
The seminar consists of know-how transfer sessions and
discussions.
Daily schedule
5 days Morning 9.00 – 12.00 h
Monday to Friday Lunch 12.00 – 13.30 h
Afternoon 13.30 – 16.30 h
Accommodation
Hotel booking can be arranged on request.
Page 6 | Contemporary Cryptography www.infoguard.ch / crypto
9. Terms and conditions
Registration Alterations
Please complete the registration form enclosed or online on • InfoGuard AG reserves the right to cancel the seminar due
our website www.infoguard.ch/crypto and fax to to an insufficient number of registrations. In such cases,
+41 41 749 19 10 or mail to info@infoguard.com. any registration fees already paid will be fully refunded.
Your registration will be confirmed in writing. • It may become necessary for us to make alterations to the
content, speakers, timing, venue or date of the event
Cancellation compared to the advertised programme.
• All cancellations must be submitted in writing.
• Up to two weeks before the start of the seminar, 25% of Terms of Payment
the registration fee will be charged for administration. • Payments are due within 10 days of the invoice date and
• Up to one week before the start of the seminar, 50% of not later than the start of the seminar.
the registration fee will be charged. • In the event of a registration at short notice, i.e. within
• In the week before the start of the seminar, the full regis- one week, the person participating in the seminar may be
tration fee will be charged. required to submit proof of payment or to pay cash prior
• No charge will be made if another person participates in to the seminar start.
the seminar on behalf of the absent participant.
Place of Jurisdiction
Substitutions/Name Changes • The place of jurisdiction is Zug, Switzerland
If you are unable to attend you may nominate, in writing,
another participant to take your place at any time prior to
the start of the seminar. Two ore more participants may not
«share» a place at a seminar. Please make separate bookings
for each participant.
www.infoguard.ch / crypto Contemporary Cryptography | Page 7
10. Enjoy your stay in Switzerland
Your stay in Switzerland will be care- InfoGuard AG – Education in in-
fully prepared. Learning will be made formation security «Made in
much easier thanks to a pleasant Switzerland».
atmosphere and interesting, exciting InfoGuard AG is the preferred edu-
leisure time. During this five day cation provider for information secu-
seminar we will organize a cultural rity. Its courses are geared to the
outing. needs of governmental and military
organizations as well as public ad-
The small but lively town of Zug ministrations.
(22’000 inhabitants) benefits from
being close to the Swiss business Crypto AG – To Remain
metropolis of Zurich and its interna- Sovereign.
tional airport, which is 35 kilometers We have developed, manufactured
away. It is situated right by Lake Zug, and implemented custom security
Basel
and surrounded by typical Swiss hills Zurich
Zug
solutions for over 55 years. You too
and mountains. The region is an Berne
Lucerne
can rely on the expertise and capa-
excellent starting point for excur- Geneva bilities of Crypto AG – just like our
sions to the country’s most interest- Lugano
customers in over 130 countries.
ing tourist attractions.
Page 8 | Contemporary Cryptography www.infoguard.ch / crypto
11. Designed and given InfoGuard AG Introduced by your Crypto AG
by the sister company Feldstrasse 1 trusted security partner: P.O. Box 460
of Crypto AG: CH-6300 Zug CH-6301 Zug/Switzerland
Switzerland Phone +41 41 749 77 22
Phone +41 41 749 19 00 Fax +41 41 741 22 72
Fax +41 41 749 19 10 crypto@crypto.ch
info@infoguard.com www.crypto.ch
www.infoguard.ch/crypto