Cryptography Training

cryptography training rootoftrust

Smart cards and IoT devices use cryptography in combination with other tools to provide security services such as confidentiality, integrity, availability, authentication and identification. Modern cryptographic techniques are based on mathematical problems which are impossible to solve in polynomial time. However, implementation of cryptographic algorithms in silicon have left them open to attack from adversaries who use techniques such as fault analysis, power analysis and timing analysis to correctly determine cryptographic keys.

Introduction to Cryptography covers:

  • encryption and decryption techniques,
  • public key and symmetric algorithms,
  • cryptographic protocols,
  • hash techniques,
  • elliptic curve cryptography.

Cryptographic training is part of the Embedded Security Training Series. For further information on training and training dates, please use our contact form below:

Contact Us