Cryptography Attacks and Defenses, Reloaded

2 DAY U_SHORT 16 CPE HOUR TRAINING: FEBRUARY 2022 * WEEK 2: FEB 19-25

DR. JEAN-PHILIPPE AUMASSON and DR. PHILIPP JOVANOVIC

Abstract

A freshly redesigned cryptography training covering all the crypto topics that matter in 2022, from cloud infrastructure to mobile and decentralized applications.

Cryptography is an indispensable tool for protecting information in computer systems, but choosing secure protocols and parameters can become quickly overwhelming. To help avoid common traps and failures, this course teaches participants how to reason about the security of crypto constructions, and how to choose secure, efficient, modern crypto components—be it algorithms, protocols, or libraries.

The training starts from the core knowledge and building blocks and gradually moves towards more advanced protocols and techniques used in modern systems, be it cloud infrastructure or decentralized applications. The class is practice-oriented, highly interactive, and includes many examples of real-world failures.

SUPPLEMENTARY READING MATERIAL AUTHORED BY THE INSTRUCTOR(S):

Agenda

1. Foundations:

  • randomness
  • hash functions
  • authenticated encryption
  • public-key cryptography (RSA, elliptic curves, Diffie-Hellman).

2. Secure Communication:

  • TLS client-server security
  • SSH
  • VPNs (WireGuard)
  • end-to-end secure messaging
  • password-based authentication (password hashing, PAKEs).

3. Real World Cryptography:

  • common coding errors
  • timing attacks
  • essential libraries/APIs/utilities
  • hardware security modules
  • key management.

4. Advanced Constructions:

  • zero-knowledge
  • secret sharing
  • multi-party computation
  • post-quantum cryptography
  • decentralized randomness
  • consensus protocols.