Watch, Follow, &
Connect with Us

Please visit our new home
community.embarcadero.com.

Public Report
Report From: Conference/US/2006/General    [ Add a report in this area ]  
Report #:  32420   Status: Open
Understanding Cryptography by Jim McKeeth
Project:  Conference Build #:  No
Version:    1 Submitted By:   Christine Ellis
Report Type:  Suggestion / Enhancement Request Date Reported:  8/7/2006 3:16:40 PM
Severity:    Infrequently encountered problem Last Updated: 8/28/2006 1:37:32 PM
Platform:    All platforms Internal Tracking #:  
Resolution: None  Resolved in Build: : None
Duplicate of:  None
Voting and Rating
Overall Rating: (13 Total Ratings)
4.38 out of 5
Total Votes: 6
Description
Understanding Cryptography by Jim McKeeth
TYPE: Regular Session
LEVEL: All
PREREQUISITES: A basic understanding of higher math.
ABSTRACT: This session will provide a high level overview of cryptography . No code to implement cryptography will be covered. We will get into some math, not for the purposes of solving the equations, but to understand how math is involved with cryptography.

This session (or at least the paper) is a prerequisite for my other encryption session.  Can optionally be included in paper for other session

Topics will be defined and compared with examples of appropriate uses. The purpose is not to show that one method or algorithm is better then another, but to provide the attendee with the information necessary to intelligently choose the best implementation for a specific application.

See my Implementing Cryptography abstract for a break down of some of the covered topics. This session will not cover any of the code or implementation that that session covers.

This session will provide great resources of tools and libraries available for cryptography.

Encryption has always been something that I have been interested in, and I am always looking for opportunities to learn more about it. Encryption is a very complicated and sticky subject, especially with all the laws. I am many times surprised at how little most people know about encryption. Shortly out of high school I designed a fairly strong private key encryption algorithm, finishing it up about the time Phil Zimmerman went to jail. This scared me away from working with cryptography for a while, but I still took every opportunity to learn what I could, many times surprising myself with how little I previously knew. Finally my employer tasked me with implementing a strong encryption
solution to secure criminal and probation records that would be transmitted over the the Internet. This was an opportunity to go the last mile and implement all that I had learned and finish learning what I needed too. Once that project was completed I went on to work more with encryption as other opportunities permitted.

I don't claim to be a complete expert at encryption, and some of the more advanced math still boggles my mind, but my experience has provided me with enough real world knowledge to help others understand this complex subject. About the time the RSA algorithm was released from it's patent I provided a users group presentation on implementing RSA with Delphi and was completely blown away by everyone's interest. The feedback I received from the group indicated that I presented this very complex subject it a very understandable way.

Outline:
Overview
Definition of cryptography
Intellectual property issues
Random Numbers

Pseudo-Random vs. "True" Random Numbers

Seeds

Entropy gathering
Selection of password / keys
Symmetrical vs. Asymmetrical

Symmetrical (Block Ciphers)


Basic Function


When and why to use


Algorithms



Blowfish



TwoFish



DES (and variations)



Rijndael



RC(x)



Skipjack



Others


Standard Cipher Modes



ECB



CBC



Others


Performance

Asymmetrical


Public vs. Private Keys


Basic function


When and why to use


Algorithms



RSA



Elliptic Curve



Others


Keys



Key Exchange



Key Rings



Trust



Certificates



Authorities


Signatures



Diffie-Hellman



Man in the middle
Compression

Before or After
Stenography
Standards and Recommendations

Advanced Encryption Standard


PKCS


SSL & OpenSSL


PGP, OpenPGP and GNUPG
Questions and Answers

At the completion of this session an attendee should be comfortable with the world of cryptography. This will enable them to intelligently choose what, when, how and if they should implement cryptography in their projects.

SPEAKER BIOGRAPHY: Jim McKeeth is a software developer with over 15 years of experience in developing software and building online communities. He runs the Boise Software Developers Group, Idaho s longest running group of its kind. Jim works at Washington Group International as a Senior Software Engineer. He is a certified trainer and has shared the stage with some of the top trainers on the continent. Jim maintains a number of successful blogs and enjoys spending time with his wonderful family.
Steps to Reproduce:
None
Workarounds
None
Attachment
None
Comments

None

Server Response from: ETNACODE01