cryptography

October 10, 2019

SECURITY

Cisco Advances Communications Security with Completion of Automated Cryptographic Validation Protocol Testing

Today’s digital economy relies on secure communications in both our personal and business activities.  We expect that when private data is transmitted over the internet, or other communications channels, it will be protected against tampering and prying eyes.  The integrity and confidentiality of in…

June 18, 2018

SECURITY

Thinking About a Cyber Career? Just Jump In

If you care about cyber security and you’re willing to work hard, we need you. Yes, YOU. The cybersecurity challenge is huge and there is a great need for people with diverse backgrounds to help solve it. Your path can originate in different places. For me, I didn’t start out intending to be a secur…

March 19, 2018

SECURITY

Reaping the Diversity Dividend

Supporting Cisco’s Women in Cyber initiative is incredibly important – to me personally and for the company. It’s all about the most important aspect of problem solving: bringing diversity of thinking to a team and to a problem—unique perspectives that we would otherwise not have because of the bias…

December 27, 2017

SECURITY

The Impact on Network Security Through Encrypted Protocols – QUIC

I have already written about two secure protocols that are impacting our network security. The first was HTTP/2, the second one was TLS 1.3. Both posts can be found here: HTTP/2 TLS1.3 Today I want to talk about another very important protocol, it is called QUIC. QUIC stands for QUICK UDP INTERNET C…

December 18, 2017

SECURITY

Collaborating with NCSU to promote lightweight crypto validation and assessment

Cryptography is very important in today’s world. Improper or maliciously altered crypto implementations have been a concern for the industry in recent years. To alleviate the risk, Cisco has been working with the industry, the National Institute of Standards and Technology (NIST) and other internati…

February 14, 2017

SECURITY

The impact on network security through encrypted protocols – TLS 1.3

This post is the second part of my series around the impact of encrypted protocols on network security. You can find the first article about HTTP/2 here: http://blogs.cisco.com/security/the-impact-on-network-security-through-encrypted-protocols-http2 Now let us focus on the new and upcoming specific…

December 30, 2016

SECURITY

The impact on network security through encrypted protocols – HTTP/2

This is the start of a planned series of posts around the impact that new protocols are making on the way many of us deal with network security today. The protocols we have been using on the internet, mainly TCP with HTTP 1.1, have shown that they cannot deal with today’s requirements for fast…

October 4, 2016

SECURITY

ETSI/IQC’s 4th Workshop on Quantum-Safe Cryptography

Quantum computers could break commonly used public key algorithms, which would affect cryptography used today. For that reason, there has been great attention on quantum safe crypto recently. We have blogged about it in numerous occasions [1], [2] , [3]. In that context, last week the 4th ETSI/IQC o…

August 25, 2016

SECURITY

Engineering Postquantum Security

While no one has yet built a general purpose Quantum Computer (QC) capable of breaking the public key cryptography in use on the Internet, that possibility is now considered a realistic threat to long-term security.  As research into the design of a QC has intensified (including public access to a s…