Avatar

Panos Kampanakis

Product Manager

Security & Trust Organization

Panos Kampanakis was born in Athens, Greece. He received his first degree on Electrical and Computer engineering from National Technical University of Athens. He received his MSc from NC State University. His thesis was on efficient elliptic curve cryptography and bilinear pairing on sensor networks.

He has extensive experience on cryptography, security automation, vulnerability management and cyber security. In his professional career, Panos has supported and provided security advice to multiple Cisco customers. He has trained and presented on various security topics at Cisco Live for numerous years. He has co-authored Cisco Press books, various standards and research publications. He has participated in various security standards bodies to provide common interoperable protocols and languages for security information sharing, cryptography and PKI. Previously he had worked extensively with Cisco's PSIRT to provide vulnerability mitigations. His current interests include next-generation cryptography, post-quantum cryptography, participation in standards efforts that enable cryptographic implementation interoperability and IoT security.

Articles

May 18, 2018

SECURITY

Collaborating with NCSU to deliver certificate validation and crypto validation reusable implementations.

Cryptography is very important in today’s world. Improper or maliciously altered crypto implementations have been a concern for the industry in recent years. On another topic, improperly validated X.509 certificates can pose a serious security concern for Web Authentication today. To address these c…

April 19, 2018

SECURITY

Towards Backward-Compatible Post-Quantum Certificate Authentication

We have blogged about post-quantum cryptography before. Quantum computers would pose a threat to PKI algorithms and systems that we know today. Cisco, with our academic collaborators, has been focusing on quantum-resistant hash-based signatures for a few years now with LMS and SPHINCS+ and more. NIS…

December 18, 2017

SECURITY

Collaborating with NCSU to promote lightweight crypto validation and assessment

Cryptography is very important in today’s world. Improper or maliciously altered crypto implementations have been a concern for the industry in recent years. To alleviate the risk, Cisco has been working with the industry, the National Institute of Standards and Technology (NIST) and other internati…

June 5, 2017

SECURITY

Taking certificate enrollment to the next level

Bouncy Castle adds support for EST Note: We would especially like to thank the Crypto Workshop team for their contributions to this post and the fruitful collaboration. Recently Crypto Workshop has been working on adding support for the EST protocol in Bouncy Castle (BC) Cryptography APIs. Bouncy Ca…

February 1, 2017

SECURITY

Lessons Learned from Testing Cisco EST Implementations with Entrust Datacard

[Note: We would especially like to thank the Entrust Datacard team for their contributions to this post and the fruitful collaboration. More info at Entrust Datacard’s Digital DNA blog series and Twitter handle (@entrustdatacard).] Products and solutions do not operate in silos. In technology, inter…

December 6, 2016

SECURITY

FIPS and Deterministic ECDSA: Achieving robust security and conformance

Digital signatures are used to verify the authenticity of a message. For example, when a message is signed, the verifier can rest assured that only the signer could have signed it. ECDSA and DSA are two widely used, standardized digital signature schemes. In order to sign a message, internally both…

October 17, 2016

SECURITY

Lessons Learned from Testing Cisco EST Implementations for Interoperability with DigiCert

Thanks to DigiCert for their contributions co-authoring this post. Interoperability for technology solutions is a top priority—standards used in these solutions become irrelevant when products operate in a silo. Thus, shifting to a new protocol in any solution takes careful consideration and collabo…

October 4, 2016

SECURITY

ETSI/IQC’s 4th Workshop on Quantum-Safe Cryptography

Quantum computers could break commonly used public key algorithms, which would affect cryptography used today. For that reason, there has been great attention on quantum safe crypto recently. We have blogged about it in numerous occasions [1], [2] , [3]. In that context, last week the 4th ETSI/IQC o…

August 5, 2016

SECURITY

Quantum-resistant signatures: an update

Quantum-resistant crypto Recently there has been great media attention on Quantum Computers (QC) and their potential impact on current cryptography standards. We blogged about it in 2015.   All of this attention has drawn out critical efforts from many in academia and industry to solve problems with…