National Cyber Warfare Foundation (NCWF)

Intermediate Cryptography Training, October 28-30


0 user ratings
2025-09-18 16:17:24
milo
Red Team (CNA)

Cryptography is a fundamental skill to cybersecurity! Cryptography is what keeps our systems and data secure. Without it, all of our information is at risk. This class to designed to give you a strong background in cryptography further enhancing you knowledge and skill in this key field making you even more valuable in the cybersecurity […]


The post Intermediate Cryptography Training, October 28-30 first appeared on Hackers Arise.







Cryptography is a fundamental skill to cybersecurity!





Cryptography is what keeps our systems and data secure. Without it, all of our information is at risk.





This class to designed to give you a strong background in cryptography further enhancing you knowledge and skill in this key field making you even more valuable in the cybersecurity marketplace.





With quantum computing and quantum cryptography emerging on the near-term horizon, a strong background in cryptography will help your organization prepare and keep your data secure.





If you are a cybersecurity professional or manager, you will want to attend this training!














1. Foundations & Mathematical Background






  • Probabilistic and computational security




  • Number theory basics (modular arithmetic, cyclic groups)




  • One-way and trapdoor functions





2. Symmetric-Key Cryptography






  • Stream ciphers (One-time pad, RC4)




  • Block ciphers (DES, AES, Feistel networks)




  • Block cipher modes (CBC, ECB, CTR, OFB)




  • Attacks: brute-force, linear, differential cryptanalysis





3. Message Authentication & Integrity






  • Message Authentication Codes (HMAC, CBC-MAC, PMAC)




  • Collision-resistant Hash Functions (SHA family, Merkle-Damgård)




  • Authenticated encryption modes (GCM, CCM)





4. Public-Key Cryptography






  • Arithmetic in finite groups, cyclic groups




  • Diffie-Hellman key exchange, CDH/Discrete-log assumptions




  • RSA and El-Gamal encryption systems




  • Security notions: semantic security, CCA security





5. Digital Signatures






  • RSA signatures, applications




  • Hash-based and elliptic curve signature schemes (ECDSA, etc.)




  • Certificates and PKI infrastructure





6. Advanced Protocols






  • Password protocols, challenge-response, salts




  • Secure key exchange protocols (TLS, SSL, authenticated key exchange)




  • Zero-knowledge proofs and commitment schemes





7. Modern & Emerging Topics






  • Post-quantum cryptography (lattice-based, hash-based schemes)




  • Quantum attacks on classical systems




  • Homomorphic encryption and applications





8. Practical Applications






  • Cryptographic implementation pitfalls (side-channel attacks, real-world failures)




  • Case studies: Secure messaging, disk encryption, cryptocurrencies




  • Secure software engineering: protocol design, trusted setup, code audits





9. Attacks and Defenses






  • Cryptanalysis case studies




  • Implementation vulnerabilities (padding oracle, timing attacks, etc.)




  • Attacks against protocols and key management









To enroll in this course, you can become a Subscriber Pro or purchase this single course.










The post Intermediate Cryptography Training, October 28-30 first appeared on Hackers Arise.



Source: HackersArise
Source Link: https://hackers-arise.com/intermediate-cryptography-training-october-28-30/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.