SecAppDev 2023 lecture details
An intro to cryptographic algorithms
In this session, you will learn about the security properties of various cryptographic building blocks, such as stream & block ciphers, hash functions, MAC algorithms, authenticated encryption schemes, public key encryption, and digital signatures.
Monday June 12th, 16:00 - 17:30
Room Lemaire
Download handoutsAbstract
The cryptographic algorithm zoo includes stream ciphers, block ciphers, hash functions, MAC algorithms, authenticated encryption schemes, public key encryption, and digital signature schemes. Each of these algorithms has different security properties and serves a specific purpose. In this session, we describe these cryptographic building blocks, explain what they can and cannot do for you and how to use them correctly. After the session, you will be able to select the right algorithm for the challenges you're trying to solve. We will also touch on the challenges posed by quantum computers.
Key takeaway
Understanding which algorithm to choose for which application
Content level
Introductory
Target audience
Anyone building, designing or securing applications
Prerequisites
None
Related lectures
Entity authentication and key establishment
Deep-dive lecture by Bart Preneel in room Lemaire
Wednesday June 14th, 11:00 - 12:30
This session explains the principles of entity authentication, authenticated key establishment and Public Key Infrastructure. The lecture is illustrated with the protocols used in 3G, SSH, TLS, and Signal.
Key takeaway: This session will explain how entity authentication and authenticated key establishment protocols work and will help you to choose the right protocol
The security model of the web
Introductory lecture by Philippe De Ryck in room Lemaire
Monday June 12th, 11:00 - 12:30
In this session, we explore how to leverage the fundamental security model of the web for security. We also explore complex attack patterns, such as CSRF, and how they impact even modern API-based applications.
Key takeaway: Understand how the browser reasons about web security, and how you can leverage this fundamental security model to secure your applications
Demystifying Zero Trust
Introductory lecture by Bart Preneel in room Lemaire
Wednesday June 14th, 09:00 - 10:30
We discuss the principles of zero trust and explain how it can be implemented. We also discuss how we can build up trust in devices, software and hardware components.
Key takeaway: Understand whether zero trust is useful for your organization or system. Reflect on which products and services you trust and why