The HSM and Cryptography Workshop accelerates your understanding of cryptography and its functions through the use of the provided software HSM. It will provide critical insights and information for all the cryptographic functions like Symmetric key functionality, Asymmetric key functionality, hashing functionality, and message authentication command (MAC) functionality.
- This workshop, unique in the industry, is perfect for a time when travel and gatherings are restricted, but you still want to increase your knowledge of the cryptography functions.
- By the end of this workshop, you will feel confident in your understanding of the overall cryptography functions. You will gain a thorough understanding of how cryptography works.
Available 24/7 online on your phone, tablet, laptop, or desktop.
Work at your own pace – review modules as many times as you need to.
No travel is needed to attend classes. The travel costs you avoid could pay for the course.
Easily digestible modular lessons with an average of 26 slides per module.
Proprietary confidence-building hands-on labs and lab tools.
Lab tool you can use on the job.
Become conversant with the industry lingo.
Accelerate your career by applying insights based on your knowledge.
Who should take this course?
This course will be of benefit to anyone interested in understanding cryptography:
- Software developers
- Product managers
- Security managers
- Operations Manager
- Project managers
The Typhon cryptography workshop consists of 13 modules:
- M100 - Crypto course overview
- M101 - Crypto foundation
- M102 - Symmetric key intro
- M103 - Symmetric key methods
- M104 - Asymmetric keys
- M105 - MAC HASH DS
- M106 - PKI
- M107 - Common criteria
- M108 - FIPS
- M150 - Lab tool installation
- M151 - Lab on symmetric keys
- M152 - Lab on asymmetric keys
- M153 - Lab on MAC HASH DS
Typhon - the Wiseravens cryptography tool provided for use in the class was named for the father of Cerberus, the three-headed watchdog of Greek mythology, and provides the following functions:
- Built-in software HSM to store your keys.
- Interfaces with any hardware HSM that supports PKCS#11.
- Data can be input in either ASCII or HEX.
- Robust logging allows you to save all your work for later review.
Symmetric key functionality:
- DES / DES2 / 3DES key generation in ECB or CBC mode.
- AES-128 / AES-192 / AES-256 key generation in ECB or CBC mode.
- Ability to run in Lab mode or HSM mode.
- HSM mode allows the storage of your generated keys in the HSM.
- Ability to encrypt and decrypt data to test key functionality.
Asymmetric key functionality:
- Ability to create and save 512 / 1024 / 2048 / 4096-bit public/private key pairs.
- Encryption functions allow you to encrypt with either the public or private Key.
- Decryption functions allow you to decrypt with either the public or private Key.
- Signing functions allow you to create digital signatures from ASCII or HEX data using.
- MD-4 / MD-5 / SHA-1 / SHA-256 / SHA-384 / SHA-512.
- The verification function allows you to verify the signed data.
- The sign and verify file function allows you to sign and verify a file.
Hashing functionality:
- Ability to create message digests using the following hashing functions.
- MD-4 / MD-5 / SHA-1 / SHA-256 / SHA-384 / SHA-512.
Message authentication command (MAC) functionality:
- Ability to create HMACs using any of the following hash algorithms.
- MD-2 / MD-4 / MD-5 / SHA-1 / SHA-224 / SHA-256 / SHA-384 / SHA-512.
- Ability to create CMACs using any of the following encryption algorithms.
- AES-128 / AES-192 / AES-256 / TDES-CMAC / TDES-CBC-CMAC / retailMAC.