Cryptography is often used in an incorrect or insecure fashion. This session outlines the current best practices, including an extensive list of recommended protocols and algorithms.
Abstract All too often, cryptography is misunderstood and misused. As a result, systems often suffer from complex and hard-to-find vulnerabilities. However, even when used correctly, selecting the right algorithm from a list of similar options is a hard task. To use cryptography well, application architects and developers need to make informed choices.
This session provides the proper information to make well-informed choices. Throughout this session, we will compile a set of best practices for using and deploying cryptographic algorithms. We cover topics such as cipher strength, key management, cryptographic libraries, and different PKI architectures. However, we also look at innovative ways of using cryptography, such as obfuscation and watermarking. In the end, you will walk away with a set of best practices for using modern cryptographic algorithms.
This session is intended for anyone building, designing or securing applications.