HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Overview of encryption tools and their use
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Overview of encryption tools and their use  
> Access to the content HTML Beginning of the presentation  
> Description Quick overview of some security solutions based on cryptography. Security criteria for encryption tools, how to tell good products from poor ones?  
> Context & Dates Euroforum seminar on Security of data exchanges on the Internet, on 25 November 1999.
 
> Author Hervé Schauer (Herve.Schauer@hsc.fr) 
> Type 25 slides [ French - HTML ]  
> Abstract &
Table of content
Flyleaf
Agenda

Hervé Schauer Consultants

Introduction : la place de la cryptographie dans la sécurité

Présentation de quelques solutions
    IPsec
    TLS/SSL
    SSH
    S/MIME
    PGP et dérivés

Longueurs de clés et niveaux de sécurité
    Types d'attaques et qualité des algorithmes
    Génération et stockage des clés

Qualité de l'ensemble du système

Solutions propriétaires versus solutions ouvertes et normes
    Les différentes situations
    Une situation déséquilibrée

Comment distinguer les bons produits des mauvais ?

Conclusion : Quel chiffrement pour quels besoins ?

Ressources et références  

> Related documents
themeCryptography
[Course]  Understanding PKI
[Course]  Data Exchanges Security: IPsec, SSL, SSH
[Course]  Understanding PKI [4 April 2003 - French]
[Course]  Introduction to cryptography [9 February 2001 - French]
[Article]  Random Numbers Generators [February 2000 - French]
[Techno-watch]  Analyse du produit Security Box Classic [18 March 1999 - French]
[Techno-watch]  Point de vue de la DISSI : les lois françaises sur le chiffrement [3 July 1995 - French]
> Copyright © 1999, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 17 April 2002 at 17:00:20 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants