Join Our Social Media
Real-World Encryption: Techniques, Attacks, and Best Practices
6:30-7pm Arrival, casual networking, food provided
7-7:30pm: RSA Cryptosystem
Emily Stamm, Security Researcher at Allstate
7:30-8pm: networking / break
8pm-8:30pm: Encryption in Practice
Tarik Moataz, CTO at Aroki Systems
8:30-9pm: more networking, event close.
Abstract for RSA Cryptosystem: In this talk, we give a brief overview of RSA, and then demonstrate the Bleichenbacher Million Message attack and Shor's Quantum algorithm for factoring.
Abstract for Encryption in practice: Describing existing techniques used to encrypt and search over data in practice. What exists, their limitations and advantages. I will then describe structured encryption, a new technique to search over encrypted data.