shape-876@2x

סייבר ואבטחת מידע

Applied Cryptography

מספר הקורס 71582

40 שעות
5 מפגשים
* מספר המפגשים והשעות למפגש עשויים להשתנות בין קורס לקורס
calendar-1.svg

המועדים הקרובים

קורס לקבוצות

הקורס נפתח במתכונת של קבוצה בלבד, בהתאמה אישית לארגונים.
לפרטים נוספים: Muzman@johnbryce.co.il

ספרו לי עוד

Overview

Cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. This course will introduce you to the fundamentals of Cryptography – from deep theory concepts, to practical applications of the different encryption schemes and where they are used in real world applications (e.g. dig. sign. in Blockchain). We will cover all aspects of modern cryptography such as data confidentiality, data integrity, authentication, and non-repudiation.

hat.png

On Completion, Delegates will be able to

Explain the strength of different encryption schemes against different kinds of attacks.

Choose the correct encryption scheme for your mission.

Correctly secure your secrets/data in your applications.

Understand Blockchain, smart contracts and their connection to crypto currencies like Bitcoin/Ethereum.

Solve Crypto CTF’s for fun & profit.

kahal.png

Who Should Attend

Developers

Researchers

Hands-on Pentesters

Malware Analysts

Math enthusiasts

structure.png

תכנית הלימודים

Full syllabus
PDF להורדה

Intro & Stream Ciphers

Block Ciphers

  • Block Ciphers 1: overview
  • Block Ciphers 2: The Data Encryption Standard
    • The Data Encryption Standard (DES)
    • Exhaustive search attacks
    • More attacks on block ciphers
  • Block Ciphers 3: AES and other constructions
    • The AES block cipher
    • Block ciphers from PRGs
  • How to Use Block Ciphers 1: one-time key
    • Review: PRPs and PRFs
    • Modes of operation: one-time key
  • How to Use Block Ciphers 2: many-time key
    • Security for many-time key (CPA security)
    • Modes of operation: many-time key (CBC)
    • Modes of operation: many-time key (CTR)

Message Integrity

  • Message Integrity 1: definitions
    • Message authentication codes
    • MACs based on PRFs
  • Message Integrity 2: constructions
    • CBC-MAC and NMAC
    • MAC padding
  • Collision Resistance 1: what is a collision resistant function?
    • Introduction
    • Generic birthday attack
  • Collision Resistance 2: constructions
    • The Merkle-Damgard paradigm
    • Constructing compression functions
  • HMAC: a MAC from a hash function

Basic Key Exchange

Public-Key Encryption

Digital Signatures

Intro to Blockchain

  • What is the Blockchain?
  • Application of the Blockchain.
  • Differences between PoW and PoS.
  • Bitcoin
    • Brief History Overview
    • Crypto used in Bitcoin (SHA256, ECDSA)
    • Full nodes
    • Different kinds of wallets (cold, paper, hardware), and the risks of using each.
    • Transactions and blocks structures.
    • The mining process, tx fees, miners reward.
    • Mining difficulty.
  • Intro to dapps and smart contracts (Ethereum)
    • Truffle, ERC Process (ERC-20)

Packers

  • Different types: Inline, New PE, Resource
  • Cryptography techniques used.

Ransomware

  • Overview on Ransomware evolution
  • How to revert Ransomware operation?
  • Petya ransomware full breakdown

CPU Enclaves

  • CPU Enclaves technology overview
  • Intel SGX breakdown – is it secure?
  • What is attestation?
  • Known attacks (side-channel)
  • Simple Enclave programming

 

Prerequisites
  • C and Python programming.
  • Linear Algebra, Probability, Group Theory.

Schedule Appointment

Fill out the form below, and we will be in touch shortly.

לא הצלחנו לאתר את הטופס.

בודק...