cryptography

October 10, 2019

SECURITY

Cisco Advances Communications Security with Completion of Automated Cryptographic Validation Protocol Testing

We assume our communications are secure.  But are they?  Cryptography provides the foundation of secure communications, but how to know if that cryptography is correct and secure?

June 18, 2018

SECURITY

Thinking About a Cyber Career? Just Jump In

If you care about cyber security and you’re willing to work hard, we need you. Yes, YOU.

March 19, 2018

SECURITY

Reaping the Diversity Dividend

Supporting Cisco’s Women in Cyber initiative is incredibly important – to me personally and for the company. It’s all about the most important aspect of problem solving: bringing diversity of...

December 27, 2017

SECURITY

The Impact on Network Security Through Encrypted Protocols – QUIC

QUIC stands for Quick UDP Internet Connections, an experimental protocol designed and deployed by Google.

December 18, 2017

SECURITY

Collaborating with NCSU to promote lightweight crypto validation and assessment

Cryptography is very important in today’s world. Improper or maliciously altered crypto implementations have been a concern for the industry in recent years. To alleviate the risk, Cisco has been working with the industry, the National Institute of Standards and Technology (NIST) and other international organizations on finding ways to validate crypto implementations and speed […]

February 14, 2017

SECURITY

The impact on network security through encrypted protocols – TLS 1.3

This post is the second part of my series around the impact of encrypted protocols on network security. You can find the first article about HTTP/2 here: http://blogs.cisco.com/security/the-impact-on-network-security-through-encrypted-protocols-http2 Now let us focus on the new and upcoming specification of TLS 1.3. It is important to understand what advantages TLS 1.3 brings to us, but also […]

December 30, 2016

SECURITY

The impact on network security through encrypted protocols – HTTP/2

This is the start of a planned series of posts around the impact that new protocols are making on the way many of us deal with network security today. The protocols we have been using on the internet, mainly TCP with HTTP 1.1, have shown that they cannot deal with today’s requirements for fast and […]

October 4, 2016

SECURITY

ETSI/IQC’s 4th Workshop on Quantum-Safe Cryptography

Quantum computers could break commonly used public key algorithms, which would affect cryptography used today. For that reason, there has been great attention on quantum safe crypto recently. We have blogged about it in numerous occasions [1], [2] , [3]. In that context, last week the 4th ETSI/IQC on Quantum-Safe Cryptography in Toronto, Canada brought […]

August 25, 2016

SECURITY

Engineering Postquantum Security

While no one has yet built a general purpose Quantum Computer (QC) capable of breaking the public key cryptography in use on the Internet, that possibility is now considered a realistic threat to long-term security.  As research into the design of a QC has intensified (including public access to a small implementation), so has the […]