cryptography
Cisco Advances Communications Security with Completion of Automated Cryptographic Validation Protocol Testing
Today’s digital economy relies on secure communications in both our personal and business activities. We expect that when private data is transmitted over the internet, or other communications channels, it will be protected against tampering and prying eyes. The integrity and confidentiality of in…
Thinking About a Cyber Career? Just Jump In
If you care about cyber security and you’re willing to work hard, we need you. Yes, YOU. The cybersecurity challenge is huge and there is a great need for people with diverse backgrounds to help solve it. Your path can originate in different places. For me, I didn’t start out intending to be a secur…
Reaping the Diversity Dividend
Supporting Cisco’s Women in Cyber initiative is incredibly important – to me personally and for the company. It’s all about the most important aspect of problem solving: bringing diversity of thinking to a team and to a problem—unique perspectives that we would otherwise not have because of the bias…
The Impact on Network Security Through Encrypted Protocols – QUIC
I have already written about two secure protocols that are impacting our network security. The first was HTTP/2, the second one was TLS 1.3. Both posts can be found here: HTTP/2 TLS1.3 Today I want to talk about another very important protocol, it is called QUIC. QUIC stands for QUICK UDP INTERNET C…
Collaborating with NCSU to promote lightweight crypto validation and assessment
Cryptography is very important in today’s world. Improper or maliciously altered crypto implementations have been a concern for the industry in recent years. To alleviate the risk, Cisco has been working with the industry, the National Institute of Standards and Technology (NIST) and other internati…
The impact on network security through encrypted protocols – TLS 1.3
This post is the second part of my series around the impact of encrypted protocols on network security. You can find the first article about HTTP/2 here: http://blogs.cisco.com/security/the-impact-on-network-security-through-encrypted-protocols-http2 Now let us focus on the new and upcoming specific…
The impact on network security through encrypted protocols – HTTP/2
This is the start of a planned series of posts around the impact that new protocols are making on the way many of us deal with network security today. The protocols we have been using on the internet, mainly TCP with HTTP 1.1, have shown that they cannot deal with today’s requirements for fast…
ETSI/IQC’s 4th Workshop on Quantum-Safe Cryptography
Quantum computers could break commonly used public key algorithms, which would affect cryptography used today. For that reason, there has been great attention on quantum safe crypto recently. We have blogged about it in numerous occasions [1], [2] , [3]. In that context, last week the 4th ETSI/IQC o…
Engineering Postquantum Security
While no one has yet built a general purpose Quantum Computer (QC) capable of breaking the public key cryptography in use on the Internet, that possibility is now considered a realistic threat to long-term security. As research into the design of a QC has intensified (including public access to a s…