encryption for executives
encryption for executives

Encryption for executives Seminar

This seminar was designed to provide a clear and concise understanding of encryption technologies, including Cloud based encryption platforms.

Cloud KMS attempts to provide encryption as a service. This Seminar covers

  1. What is Encryption? What are the types of Encryption?
  2. What is Envelope Encryption? How does PKI Work with Envelope Encryption?
  3. How does the cloud help with Envelope Encryption?
  4. What is KMS? What is the KMS API?
  5. What can you encrypt using Cloud KMS? What can you NOT encrypt?
  6. What problems does Cloud KMS Solve? Is it a game changer for the encryption market?

Cryptography History and Current Applications

Cryptography has a rich history; however, nowadays, you will come across new concepts, such as blockchain, that can be used as a tool to help secure data. Blockchain uses several cryptographic concepts and technologies. New applications of cryptography include quantum-resistant algorithms, which hold up against a potential quantum attack using quantum key distributions. They use protocols such as BB84 and BB92 to leverage the concepts of quantum entanglement and create good-quality keys for using classical encryption algorithms.

AES Strong Encryption

AES is the encryption standard approved   by the United States National Institute of Standards. It’s approved  for the storage of secret military information. It is private key cryptography, which is the kind of cryptography that has been used for thousands of years in which both the sender and the receiver use the same key. It’s a block cipher, so the input data has to be put in blocks that are 128-bits long, and a block of plaintext is encrypted with a key, producing a block of ciphertext:

RSA (PKI) Strong Encryption

In public key encryption, we solve a different problem – that of a PUBLIC channel (no private channel). Amazon, for example, wants to receive confidential data from users, such as passwords and credit card numbers, but they don’t have a secure communication channel.

All we have is the public internet, and any data being sent might be intercepted / eavesdropped upon by any number of middlemen. Thus, there’s no way to deliver a shared secret key, and symmetric encryption algorithms, such as AES, cannot solve this problem. That’s where public key encryption comes in.

Amazon creates a key pair. They keep the private key secret and don’t tell anyone, and they publish public key so anyone can use it.

More in this exciting seminar. Also check out our Quantum Computing Seminar

Schedule your Encryption for Executives Seminar Today.