Cisco Advances Communications Security with Completion of Automated Cryptographic Validation Protocol Testing
We assume our communications are secure. But are they? Cryptography provides the foundation of secure communications, but how to know if that cryptography is correct and secure?
Thinking About a Cyber Career? Just Jump In
If you care about cyber security and you’re willing to work hard, we need you. Yes, YOU.
The Impact on Network Security Through Encrypted Protocols – QUIC
QUIC stands for Quick UDP Internet Connections, an experimental protocol designed and deployed by Google.
Collaborating with NCSU to promote lightweight crypto validation and assessment
Cryptography is very important in today’s world. Improper or maliciously altered crypto implementations have been a concern for the industry in recent years. To alleviate the risk, Cisco has been working with the industry, the National Institute of Standards and Technology (NIST) and other international organizations on finding ways to validate crypto implementations and speed […]
The impact on network security through encrypted protocols – TLS 1.3
This post is the second part of my series around the impact of encrypted protocols on network security. You can find the first article about HTTP/2 here: http://blogs.cisco.com/security/the-impact-on-network-security-through-encrypted-protocols-http2 Now let us focus on the new and upcoming specification of TLS 1.3. It is important to understand what advantages TLS 1.3 brings to us, but also […]
The impact on network security through encrypted protocols – HTTP/2
This is the start of a planned series of posts around the impact that new protocols are making on the way many of us deal with network security today. The protocols we have been using on the internet, mainly TCP with HTTP 1.1, have shown that they cannot deal with today’s requirements for fast and […]
ETSI/IQC’s 4th Workshop on Quantum-Safe Cryptography
Quantum computers could break commonly used public key algorithms, which would affect cryptography used today. For that reason, there has been great attention on quantum safe crypto recently. We have blogged about it in numerous occasions ,  , . In that context, last week the 4th ETSI/IQC on Quantum-Safe Cryptography in Toronto, Canada brought […]
Engineering Postquantum Security
While no one has yet built a general purpose Quantum Computer (QC) capable of breaking the public key cryptography in use on the Internet, that possibility is now considered a realistic threat to long-term security. As research into the design of a QC has intensified (including public access to a small implementation), so has the […]