“The core of cybersecurity is cryptography.”
Digitalisation, data breaches, side-channel attacks, quantum threats… The world is more vulnerable now than ever, and security systems designed today must be able to cope with digital threats of tomorrow.
With Xiphera’s Excellence in Cryptography training, both you and your team will be provided with the best state-of-the-art cryptographic knowledge. Excellence in Cryptography, combining fundamentals of cryptography with their best practices, creates a solid foundation to prepare for external cyber threats.
Xiphera’s Excellence in Cryptography is tailored to perfectly match the customer’s specific needs. For those who desire to have an introduction to cryptographic fundamentals, best practices, and future trends – whether you are a business leader, product planner, or a sales manager – we offer Introductory and Explanatory level trainings. If you are a technologist working with cryptographic algorithms and their implementation in your daily work, the advanced Power User level with hands-on demonstrations is the right choice for you.
After the training, you will be able to
The Introductory level provides the key takeaways of the topics, and enables you to understand the fundamentals of the cryptographic concepts.
The Explanatory level discusses each cryptographic concept at a deeper level, enabling participants to understand differences between available methods and algorithms. At this level, the trade-offs between cryptographic methods and future risk assessments are presented.
The Power User level includes hands-on demonstrations and leads to a deeper understanding of the fundamental operations and trade-offs of the cryptographic algorithms.
Xiphera’s Excellence in Cryptography is built of different modules focusing on various thematic topics. Modules are offered in three levels: Introductory, Explanatory, and Power User. The training is customised based on your team’s individual needs and interests, including a selection or all of the modules introduced below.
The crash course is designed for those who want to understand the essential key characteristics of cryptography effectively. The duration of the course is typically 45/60/90 minutes, and the course topics will be tailored based on your specific interests. Check modules A to D for available topics and discuss your requirements with the trainer.
The foundation of cybersecurity is cryptography, and understanding the possibilities of cryptography and its fundamental objectives is therefore crucial. This module is an introduction to cryptography, offering a concise overview of cryptographic theory and practice.
The module covers the following topics:
This module is highly recommended for everyone who is working with cryptography or information security. The module is an intensive walk-through of contemporary cryptographic primitives both in theory and practice. This module is offered in all three Excellence levels. For the Power User level, the content will be tailored to match your specific needs.
The module covers the following topics:
Practically every computing element and service in the world needs cryptographic protection. This protection is increasingly needed regardless of whether the computing element is connected to a public or private network. Creating digital trust relies on cryptographic primitives, and the topics covered in module B are applied when creating digital trust. This module is offered in three Excellence levels.
The module covers the following topics:
Quantum computing (QC) can potentially revolutionise information and data processing. Quantum computers can break existing public key cryptographic algorithms, if a sufficiently large number of meaningful qubits will be available in a quantum computer. The public key algorithms are the foundation of existing digital trust and are currently used excessively in network communication. To guarantee information security also in the future, the cryptographic algorithms need to be modified and updated for the emerging quantum computing era. After the training, the participants will understand post-quantum cryptography requirements for devices, services, and systems.
The module covers the following topics:
Where classical cryptoanalysis tries to find weaknesses of the cryptographic primitives using black-box attacks, the advanced grey-box attacks aim to extract the side-channel information from cryptographic implementations. The grey-box attacks are applied to cryptographic primitives or complete digital trust platforms which use cryptography. The collected side-channel information can provide attackers a sufficient attack-surface to compromise the security of a system.
The module covers the grey-box attacks both in theory and practice, focusing on practical side-channel attacks: