This workshop will include topics for 
            implementation of standard algorithms to your enterprise programs in 
            the business enviroment cryptography is being a big step on security 
            , and propietary application with client/server model or IPC 
            communication that manages sensitive data needs to be protected by a 
            math function.
            
            In this course you will learn about:
            
            - Basic Math function implementations
            - How standards work
            - UNIX implementation
            - Custom algorithm development
            
            Main information:
            
              
                | 
                Global Time: | 
              
              
                | -30 Hours (Monday 
                to Friday 14:00 to 20:00) | 
              
              
                | 
                Administrative Requirements: | 
              
              
                | -Covered Payment | 
              
              
                | -Copy of your oficial ID Card. | 
              
              
                | -Signed 
                Confidential Agreement Contract. | 
              
              
                | 
                Technical Requirements: | 
              
              
                | -C Language 
                knowledge | 
              
              
                | -Assembly 
                Language knowledge (for standalone plattform algorithms)  | 
              
              
                | -Unix Basics for 
                entropy handling | 
              
              
                | 
                Objectives: | 
              
              
                | -Learn 
                Mathematical facts (laws , factoring, discrete log, etc..) | 
              
              
                | -Learn the Key 
                handling (length , tips for generation, expansion) | 
              
              
                | -Learn boolean 
                operators for custom algorithm | 
              
              
                | -Learn Types of 
                ciphers | 
              
              
                | -Arithmetic of 
                Matrices for random tables and substitution ciphers | 
              
              
                | -Implementation 
                of block cipher and stream cipher using finite fields | 
              
              
                | -Analizing the 
                security of your custom algorithm | 
              
              
                | -Entropy handling 
                on UNIX for pseudorandom number generator | 
              
              
                | -Implementation 
                of a perfect cipher scheme using one-time pads | 
              
              
                | -One way hash 
                functions (development) | 
              
              
                | -Theorical 
                resources: | 
              
              
                | * Quantum 
                Cryptography | 
              
              
                | * How RSA and 
                Diffie-Hellman protocols work ? | 
              
              
                | * Elliptic Curve 
                cryptosystems | 
              
              
                | -Development of a 
                custom symetric cryptosystem | 
              
              
                | 
                Participant Profile: | 
              
              
                | -Interested in 
                math | 
              
              
                | -Interested in 
                security | 
              
              
                | -Experience with 
                C programming | 
              
              
                | -Hability to 
                learn | 
              
              
                | 
                Included Material: | 
              
              
                | -Presentations 
                used in the training | 
              
              
                | -Source codes of 
                examples | 
              
              
                | -Exercices | 
              
              
                | 
                Modules: | 
              
              
                | -Basic 
                Mathematical background | 
              
              
                | -C programming 
                using logical functions | 
              
              
                | -Asymetric and 
                symetric ciphers | 
              
              
                | -Gathering 
                information | 
              
              
                | -Key generation , 
                handling , length and expansion | 
              
              
                | -Block ciphers 
                and stream ciphers | 
              
              
                | -My block cipher 
                & stream cipher using a simple xor  | 
              
              
                | -Creating an 
                algorithm | 
              
              
                | -Hash functions | 
              
              
                | -Linear Algebra 
                for cryptographic purposes (using Hypersec Matrix lib) | 
              
              
                | -Entropy handling 
                on UNIX for randomness | 
              
              
                | -Implementation 
                of a real cipher with other functions and entropy | 
              
              
                | -Implementation 
                of a hash function  | 
              
              
                | -Implementation 
                of a perfect cryptographic scheme using one time pads | 
              
              
                | *Math Theory : | 
              
              
                | -What is quantum 
                cryptography  | 
              
              
                | -What is an 
                elliptic curve cryptosystem | 
              
              
                | -Asymetric 
                protocols:  | 
              
              
                | RSA and Diffie-Hellman 
                , and discrete logarithms | 
              
              
                | -Number Theory | 
              
              
                | 
                Exercises: | 
              
              
                | -Practice and 
                examples of all the programming topics before development | 
              
              
                | -Writing your 
                idea in a C program | 
              
              
                 |