Overview of Cryptography, including different topics such as: - History of Cryptography - Types of Cryptography Symmetric Encryption, including: - Overview of the Symmetric encryption - Main requirements - Cryptanalysis and Brute-force Attack - Discussion of symmetric techniques: - Substitution technique - Monoalphabetic technique - Transposition ciphers - and DES Algorithm Asymmetric Encryption, including: - Overview of the Asymmetric encryption - Advantages of Asymmetric Encryption - Public-Key Cryptography - Public-Key Applications - Security of Public Key Schemes - Applications such as RSS Algorithm – Asymmetric Cipher Digital Signature, including: - Digital Signature Model - Digital Signature - Digital Signature Properties
- Docente: Abdelkader Shaaban

This seminar will provide participants with the necessary knowledge to identify and address potential security problems and threats associated with the emergence of various types of communication networks within port infrastructures and the maritime domain in general. Participants will learn about most common vulnerabilities and threats for specific network systems. This seminar will also focus on concepts, techniques and tools to protect the networks within maritime infrastructures and describe the important concepts of networks security.
Trainers:
Dr. Stefan Schauer, Senior Scientist, Austrian Institute of Technology (AIT), stefan.schauer@ait.ac.at
Dr. Abdelkader Shaaban, Scientist, Austrian Institute of Technology (AIT), abdelkader.shaaban@ait.ac.at
Duration: 4h.
ECTS (microcredentials): 1.
- Docente: Abdelkader Shaaban