Cryptography vs Cybersecurity: Clarifying the Foundations
Before diving into post-quantum cryptography, this optional workshop helps participants differentiate between two often-confused fields: cryptography and cybersecurity. You’ll explore their respective goals, overlaps, and how they work together to protect digital systems.
This session sets the stage for the main course by establishing a foundational understanding of how modern cryptographic systems operate and where they fit within broader security infrastructures.
Content
- Cybersecurity vs Cryptography: definitions, goals, and boundaries
- Real-world examples of cryptographic applications (e.g., HTTPS, messaging, digital identity)
- The role of cryptography within digital security systems
- Discussion: threats, attack surfaces, and emerging challenges
Learning Outcomes
By the end of this workshop, participants will be able to:
- Distinguish between cryptography and cybersecurity in terms of purpose and scope
- Identify common cryptographic tools (e.g., encryption, digital signatures) and their roles in protecting data
- Describe how cryptography fits within broader cybersecurity systems (e.g., HTTPS, messaging apps)
- Recognize real-world scenarios where both fields are applied and understand what happens when either fails
Training Method
This workshop uses a mix of short lectures, real-world examples, and guided discussions to help participants clearly distinguish cryptography from cybersecurity.
Through visual comparisons, live walkthroughs (like HTTPS), and a simple case study, learners build practical understanding without needing technical depth. The session is structured, interactive, and grounded in everyday digital experiences.
Certification
Certificate of ParticipationPrerequisites
No technical background required. This workshop is designed for a general audience, including students, professionals, and anyone curious about digital security.
Planning and location
12:30 - 14:30