Understanding cryptography and key management

Course

In London

£ 1,600 + VAT

Description

  • Type

    Course

  • Location

    London

  • Duration

    3 Days

this course is designed for those responsible for the security of information and its transfer. it provides an in-depth analysis of the cipher systems available and how to implement and use them. the topic is approached from a non-mathematical perspective. Suitable for: it managers. security managers. technical staff. system designers & implementers

Facilities

Location

Start date

London
See map
210 Borough High St, SE1 1JX

Start date

On request

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

course description
this course is designed for those responsible for the security of information and its transfer. it provides an in-depth analysis of the cipher systems available and how to implement and use them. the topic is approached from a non-mathematical perspective.

target audience
  • it managers
  • security managers
  • technical staff
  • system designers & implementers
course content

introduction
- the need for security
- security services: confidentiality, data integrity, authentication (of message source and of identity) and non-repudiation


symmetric ciphers
- historical examples
- theoretical security (one-time pad)
- stream ciphers
- block ciphers (including des, aes)
- modes of operation (ecb, cbc, cfb, ofb)
- message authentication codes (macs)


asymmetric techniques
- public key encryption (including rsa)
- key-agreement (diffie-hellman) and digital signatures (including rsa, dsa). includes discussion of hash functions
- elliptic curve cryptography and a comparison between the different techniques


entity authentication techniques


the key management lifecycle
  • key generation
  • key storage
  • key distribution: symmetric and asymmetric techniques, digital certificates (x.509), cas
  • key usage: key separation, key variants, certificate extension fields
  • key backup
  • key update
  • key destruction
  • key revocation: crls, ocsp
  • pki

cryptographic protocols
  • ssl/tls
  • s/mime
  • ipsec
run in conjunction with qtandc

Understanding cryptography and key management

£ 1,600 + VAT