Loading…
SecAppDev 2019 has ended
Tuesday, February 19 • 16:00 - 17:30
Cryptographic algorithms

Sign up or log in to save this to your schedule and see who's attending!

Cryptographic algorithms include stream/block ciphers, hash functions, MAC algorithms, authenticated/public key encryption schemes, and digital signatures. This session focuses on their properties, and on what they can and cannot do for you.


Abstract
The cryptographic algorithm zoo includes stream ciphers, block ciphers, hash functions, MAC algorithms, authenticated encryption schemes, public key encryption, and digital signature schemes. These cryptographic building blocks can be used to offer strong security properties. However, each of these algorithms has different security properties and serves a specific purpose. To avoid creating vulnerabilities, a good understanding of these algorithms is essential.

In this session, we zoom in on each of these algorithm types. We will investigate their properties, what they can and cannot do for you, and how to use them correctly. In the end, you will be able to select the right algorithm for the challenges you're trying to solve. In essence, you will be able to find your way in the algorithm zoo.


This session is intended for anyone building, designing or securing applications.

Speakers
BP

Bart Preneel

Full professor, KU Leuven


Tuesday February 19, 2019 16:00 - 17:30
Main building (room Lemaire)