This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "File:OWASPSanAntonio 2006 06 Crypto Content.pdf"

From OWASP
Jump to: navigation, search
(Reverting to last version not containing links to www.textolodelvilal.com)
 
Line 1: Line 1:
http://www.textolodelvilal.com
 
 
[[Category:OWASP Presentations]]
 
[[Category:OWASP Presentations]]
 
Cryptography Transitions are defined as "Managing the passage from one cryptographic architecture to another in a methodical approach that is consistent with prudent business practices and security guidelines." This talk will first discuss the technology issues that precipitate a transition; guiding principles to conduct a transition; the transition process itself; and briefly review several case studies. Next, the talk will introduce the ANSI accredited standards committee X9 that develops cryptography and security standards for the financial services industry. Finally, the talk will focus on applying cryptography in a Web application environment, the corresponding key management issues, review the Visa CISP requirements; and industry current practices (not so good), industry best practices (better), what industry should be doing.
 
Cryptography Transitions are defined as "Managing the passage from one cryptographic architecture to another in a methodical approach that is consistent with prudent business practices and security guidelines." This talk will first discuss the technology issues that precipitate a transition; guiding principles to conduct a transition; the transition process itself; and briefly review several case studies. Next, the talk will introduce the ANSI accredited standards committee X9 that develops cryptography and security standards for the financial services industry. Finally, the talk will focus on applying cryptography in a Web application environment, the corresponding key management issues, review the Visa CISP requirements; and industry current practices (not so good), industry best practices (better), what industry should be doing.

Latest revision as of 18:28, 27 May 2009

Cryptography Transitions are defined as "Managing the passage from one cryptographic architecture to another in a methodical approach that is consistent with prudent business practices and security guidelines." This talk will first discuss the technology issues that precipitate a transition; guiding principles to conduct a transition; the transition process itself; and briefly review several case studies. Next, the talk will introduce the ANSI accredited standards committee X9 that develops cryptography and security standards for the financial services industry. Finally, the talk will focus on applying cryptography in a Web application environment, the corresponding key management issues, review the Visa CISP requirements; and industry current practices (not so good), industry best practices (better), what industry should be doing.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current13:11, 10 July 2006 (429 KB)Dancornell (talk | contribs)Cryptography Transitions are defined as "Managing the passage from one cryptographic architecture to another in a methodical approach that is consistent with prudent business practices and security guidelines." This talk will first discuss the technology
  • You cannot overwrite this file.

The following page links to this file: