Check out the new USENIX Web site.  3rd USENIX Workshop on
Electronic Commerce, - August 31- September 3, 1998, - The
Tremont Hotel, Boston, Massachusetts
 
 
Tutorial Program   Monday , August 31, PM Session
 
Registration


Program Committee


Program at-a-Glance


Tutorials at-a-Glance
 
 Tutorial Instructors


Technical
Sessions

 
 Tuesday, Sept. 1
 
 Wednesday, Sept. 2
 
 Thursday, Sept. 3



Activities and Services


Hotel & Travel Info


USENIX & SAGE Thank Supporting Members


Student Discounts and Stipends

M5pm   Cryptography for the Internet   half day program
Bruce Schneier, Counterpane Systems

Who should attend: Those who need to understand how cryptography is used over the Internet to secure communications, establish authenticity, and provide for integrity. This tutorial does not assume a strong background in mathematics.

Security is essential for business and social interactions. The pre-computer world has developed many mechanisms to establish security: voice recognition on the telephone provides authentication, signatures on paper provide proof of intent, closed doors and walks in the park provide privacy, unforgeable currency provides fairness. As more businesses and social interactions move onto the Internet, the challenge is to mirror these techniques as much as possible in this new world.

This tutorial will illustrate how cryptography can transform the Internet into a serious business tool by allowing for confidentiality, authentication, integrity, fairness, and much more. This tutorial will discuss the protocols to secure electronic mail, World Wide Web interactions, electronic commerce transactions, and other security measures the Internet community has developed. After completing this tutorial, participants will understand how cryptography is used on the Internet. Attendees will be able to vigorously debate the pros and cons of different systems for their own purposes.

Topics covered include:

-    Cryptography in a Networked World
-    Tools of Internet Cryptography
-    Threat Modeling
-    E-Mail Security: PGP, S/MIME
-    Trust Management: X.509, SDSI, SPKI
-    IP Security
-    World-Wide Web Security
-    Electronic Commerce: Cybercash, Digicash, First Virtual, SET

 


Bruce Schneier   is president of Counterpane Systems, a cryptography and computer security consulting company. He is the author of Applied Cryptography (John Wiley & Sons), the seminal work in its field. Now in its second edition, Applied Cryptography has sold over 80,000 copies world-wide and has been translated into four languages. His papers have appeared at international conferences, and he has written dozens of articles on cryptography for major magazines. He designed the popular Blowfish encryption algorithm, still unbroken after years of cryptanalysis.

 


Program at-a-Glance -   Tutorials -   Technical Program -   Registration -
Conference Activities -   Hotel & Travel Info -   Program Committee -   Conference Brochure Home
   Workshop Index
   Events Calendar
   USENIX home