Understanding Basic Cryptography Used in Encrypted Third Party Services, Bitcoin/Blockchain, TOR, DarkNets and 3G/4G/5G Cellular Services

Sponsored By: TeleStrategies' ISS World®

January 14, 2020 : Online Webinar

TIME: 9:00-10:00 AM New York Time, Eastern USA Time

Presented by:
Jerry Lucas (PhD, Physics)
President, TeleStrategies


Free for Law Enforcement, the government intelligence community and private enterprise cyber security managers. Registration with Government or Corporate e-mail address is required.


Click here to register  Click Here To Register


Understanding Basic Cryptography Used in Encrypted Third Party Services, Bitcoin/Blockchain, TOR, DarkNets and 3G/4G/5G Cellular Services

In today's digital world almost every transmission is encrypted or soon to be. As such, criminals and terrorists rely on encryption. Today encryption can't be broken so law enforcement and the intelligence community must know how to work around encryption.

This webinar presents areas of today's digital environment where cryptography is applied and how it's done. Top twelve cryptography application sessions, 5 minutes or so on each and light on the math.

Note, this one hour training session is also presented along with 30 hours of pre-conference, advance training sessions at our five annual ISS World Programs scheduled in Asia, Europe, Middle East, North and Latin America.

  1. Public Key Infrastructure (PKI): Basics of RSA, DH and ECC, differences and what applications deploy each and why.
  2. Symmetric Keys: Why symmetric keys vs. PKI, relationship with PKI and differences (AES vs. DES vs. RC4) and by exchange.
  3. Hashing: What is it and how it works, what applications use hashing and standards (SHA-256, etc.)
  4. Certificate Authorities (CA): Why CA's, PKI and Trust and the key standard X.509 explained.
  5. Crypto Tunneling: SSL/TLS, VPN Tunnels, IPSec and IKE.
  6. Third Party Encrypted Services: The basics cryptography of Gmail, Telegram, WhatsApp and other third party encryption email services.
  7. Bitcoin/Blockchain and other Altcoins: Bitcoin/Blockchain Cryptography, use of ECC & SHA-256, Altcoins (Monero, Ethereum, etc.) and how they differ from Bitcoin/Blockchain.
  8. TOR and TOR Hidden Services; Cryptography in TOR, TOR Hidden Services and other Dark Webs (Freenet, I2p, Zeronet, etc.)
  9. Cellular Encryption: SIM cards and cryptography, Algorithms (A3, A5 and A8), Ki Authentication and 5G public-private key introduction for IMSI encryption.
  10. Defeating (or Getting Around) Encryption Examples: MiTM Attacks, Defeating TOR, IT Intrusion Basics, Defeating Facebook's WhatsApp and Decrypting seized Apple iPhones.
  11. IETF and Future Cryptography Challenges: TLS 1.3, Free Certificates, HTTP2 and other IETF initiatives.
  12. Quantum Computing: The target for decryption (e.g. PKI), quantum computing parameters to monitor (the number of entangled qubits, error correction, etc.) and why quantum computing is superior to today's digital computing for running Shor's (Defeating Encryption Algorithm) and when to expect nation states to reach defeating encryption reality.

Presented by:
Jerry Lucas (PhD, Physics)
President, TeleStrategies

Click here to register  Click Here To Register

Webinar FAQ's

All Contents Copyright © 2020
TeleStrategies, Inc.
6845 Elm Street, Suite 310
McLean, VA 22101

voice:
703-734-7050 fax:703-893-3197