Designing Secure Protocols // One Day Course (March 15)
Moxie Marlinspike
Overview:
Attendees will learn the fundamentals of how to design a secure protocol, and be armed with the knowledge of how to evaluate the security of and discover weaknesses in existing protocols.
What You Will Learn:
This training covers the design of secure protocols in depth, leaving students with a thorough understanding of how secure protocols are modeled, how the building blocks of cryptography can be combined to result in something secure, and how to look at secure protocols that others publish (from SSH to SSL to Tor to encrypted web cookies) with a critical eye. Concepts that are often tossed around such as IND-CCA, the birthday paradox, chosen plaintext attacks, and authenticated encryption will be covered in detail.
Who Should Attend:
Anyone interested in designing or evaluating secure protocols. Some existing basic knowledge of internet protocols and probability will be useful to attendees.
What to Bring
- Bring a Laptop.
Trainer:
Moxie Marlinspike is the CTO of Whisper Systems. He recently published the null-prefix attacks on X.509, the session-denial attacks against OCSP, and is the author of both sslsniff and sslstrip. He runs a cloud-based WPA cracking service, a targeted Google anonymity service, and created the Convergence project for replacing Certificate Authorities. His tools have been featured in many publications including Hacking Exposed, Forbes Magazine, The Wall Street Journal, the New York Times, and Security Focus as well as on international TV.
Early: Ends January 6 |
Regular: Ends February 29 |
Late: Ends March 15 |
$995 EUR |
$1195 EUR |
$1395 EUR |