Summary of Webinar Asymmetric Cryptography: From Primitive Techniques to Advanced Approaches
Summary of the Webinar on Asymmetric Cryptography
Main Ideas and Concepts:
-
Introduction to Asymmetric Cryptography:
The webinar focused on the principles of Asymmetric Cryptography, which uses a pair of keys (public and private) for secure communication. Asymmetric Cryptography differs from symmetric cryptography, which uses a single key for both encryption and decryption.
-
Key Algorithms:
Discussion of popular asymmetric algorithms such as RSA and ElGamal, highlighting their applications in digital security systems. Introduction to Post-Quantum Cryptography as a response to vulnerabilities in current cryptographic methods against quantum computing threats.
-
Applications and Importance:
Emphasis on the increasing need for engineering graduates skilled in cryptography due to rapid technological advancements and the digital transformation in Indonesia. The role of universities, particularly Telkom Institute of Technology Purwokerto, in fostering education and research in cryptography and related fields.
-
Educational Initiatives:
The webinar was part of Negrip 2024, an annual event aimed at sharing knowledge and innovations in encryption and network security. The event included speeches, discussions, and interactive sessions to engage participants from various academic backgrounds.
-
Challenges and Future Directions:
The challenges posed by quantum attacks on current cryptographic systems. The need for new methodologies and approaches, such as code-based and Lattice-based Cryptography, to enhance security in the post-quantum era.
Methodology and Instructions Presented:
-
Asymmetric Cryptography Process:
- Key Generation:
- Generate a public-private key pair.
- Public key can be shared openly, while the private key must remain confidential.
- Encryption Process:
- Use the recipient's public key to encrypt a message.
- The encrypted message can only be decrypted by the recipient using their private key.
- Digital Signatures:
- Sign messages with a private key to verify the sender's identity.
- Recipients can verify the signature using the sender's public key.
- Key Generation:
-
Post-Quantum Cryptography:
Development of cryptographic methods resistant to quantum attacks, focusing on:
- Code-based Cryptography: Utilizing error correction techniques to enhance security.
- Lattice-based Cryptography: Using mathematical structures to secure data against quantum threats.
- Learning with Error (LWE): Inserting noise into computations to protect secret information.
Speakers:
- Yan Cornelius: Moderator of the webinar.
- Prof. Arawi: Key speaker, expert in cryptography and security protocols.
- Mr. Eko Fajar Cahyadi: Provided introductory remarks and facilitated discussions.
Conclusion:
The webinar provided valuable insights into the evolution of Asymmetric Cryptography, its applications, and the ongoing efforts to adapt to emerging threats, particularly from quantum computing. Participants were encouraged to engage in further discussions and research in this critical field of study.
Notable Quotes
— 00:00 — « No notable quotes »
Category
Educational