Overview

New to crypto? Our one- and two-day trainings are designed to familiarize security professionals and developers of any level with modern cryptography concepts, best practices, as well as the most common vulnerabilities. From ciphers and hash functions to blockchains and post-quantum systems, we cover all the important notions in a practice-oriented way.

The trainers hold PhDs in cryptography and have up to 10 years of experience designing cryptosystems and finding vulnerabilities in cryptography applications. They gave earlier versions of this training since 2013, notably at the Troopers conference in 2016 and 2017.

Feedback from previous sessions

"Both speakers are very knowledgeable and receptive to questions."
"All the main algorithms mentioned, lot of real-world examples."
"Excellent and up-to-date content."

Interested to participate?

Register for one of our upcoming trainings. For special requests, feel free to contact us.

Content

We cover all the important basics of modern cryptography including notions such as:

  • Ciphers, hash functions, key protocols
  • Formal security notions and attack models
  • Randomness generation and possible vulnerabilities
  • Elliptic-curve cryptography

We also present higher-level concepts and applications, including:

  • Transport Layer Security (TLS)
  • Passwords protection
  • Secure messaging
  • Bitcoin and blockchain technologies
  • Quantum computing and post-quantum cryptography

The two-day variant of the training additionally features hands-on sessions where participants learn how to put the notions and tools encountered previously into practice by being challenged to find, exploit, and fix vulnerabilities in cryptographic software. The tasks consist of a mix of made up problems and examples of real vulnerabilities found in widely deployed systems.

Trainings

Upcoming

Security Training Berlin

March 19-20, 2018
Berlin, Germany

Register

On Demand

Date and location negotiable
Ten participants minimum

Contact

Past

Event Location Dates
Google Zurich, Switzerland January 24-25, 2018
Black Hat Europe 2017 London, United Kingdom December 4-5, 2017
Starling Hotel Lausanne, Switzerland September 30, 2017
Troopers 2017 Heidelberg, Germany March 20-21, 2017
Troopers 2016 Heidelberg, Germany March 14, 2016

Trainers

Dr. Jean-Philippe Aumasson

Jean-Philippe (JP) Aumasson is Principal Research Engineer at Kudelski Security, in Switzerland. He obtained his PhD in cryptography from EPFL in 2010. JP designed the popular cryptographic functions BLAKE2 and SipHash, and the new authenticated cipher NORX. He presented at Black Hat, DEFCON, RSA, and other international conferences. He initiated the Crypto Coding Standard and the Password Hashing Competition projects, wrote the books The Hash Function BLAKE (Springer, 2015) and Serious Cryptography (No Starch Press, 2017). JP tweets as @veorq.

Dr. Philipp Jovanovic

Philipp Jovanovic is a post-doctoral researcher at the Swiss Federal Institute of Technology Lausanne (EPFL), in Switzerland. He obtained his PhD in cryptography from the University of Passau, Germany, in 2015. Philipp designed several cryptographic algorithms, such as NORX and OPP/MRO, and protocols, like CoSi, ByzCoin, and RandHound. He is actively involved in the development of open source projects like the kyber crypto library or the cothority framework for scalable, decentralized, cryptographic protocols, and he works as an adviser on the DFINITY project. His research is published regularly at top crypto/security conferences such as IEEE S&P, USENIX Security, or EUROCRYPT, and he is frequently active at non-academic events like the Chaos Communication Congress, Troopers, or dotSecurity. Philipp tweets as @daeinar.