Applied Cryptology in Modern IT
This is a course for specialists working in IT sphere, interested to know more about cryptology and its use in modern IT technologies. It consists of four parts. The first part is to get basic idea of security problems solved by cryptology, with some historical examples, and methods of cryptanalysis. The second part covers block ciphers, along with encryption keys exchange problems. Asymmetric cryptology is introduced in the third part of the course. The final part is about cryptology in modern telecommunication systems, including Internet and mobile networks.
Content
This training will cover the following:
- Introduction. Cryptographic methods in information security.
- Cipher reliability. Some methods of cryptanalysis.
- Block ciphers. Usage modes. Synthesis principles.
- Key distribution problem.
- Asymmetric ciphers.
- Digital signature schemes.
- Cryptographic hash functions.
- Cryptology in telecommunication protocols. Public keys certificates.
- Mobile networks security.
- Post-quantum cryptography.
Learning Outcomes
By the end of this training, participants will be able to:
- Demonstrate a deeper understanding of cryptography concepts.
- Identify and describe modern block ciphers used in telecommunications.
- Explain the principles of asymmetric encryption, digital signatures, and cryptographic hash functions.
- Understand how cryptology is applied in modern telecommunication systems.
Training Method
Interactive presentation and hands-on exercises
Certification
Certificate of ParticipationPrerequisites
No special knowledge is required. Some elements of mathematics (e.g., modular arithmetic) and programming (concepts of bits and bytes) may be used to support the explanations.
Planning and location
09:00 - 16:00
09:00 - 16:00
Your trainer(s) for this course
Aleksandr Ryzhov
See trainer's courses.Aleksandr was born in Moscow in 1982. He graduated from the Institute of Cryptology, Telecommunications, and Computer Science, with a master’s in Cryptology. He has 10 years of experience as a cryptanalyst and more than 10 years working as a software developer in telecommunications.