TOP LOC 1816 IP Security Workshop for End User


No later than by revealing the activities of the secret services by Edward Snowden the issue of "security" has arrived at the end user.

In the meantime, the encryption of the communication between the browser and the web server on the Internet has become self-evident. But how exactly does it work? What does it mean when the line in the browser turns green and / or a lock icon appears? What exactly are certificates, what are certification bodies for, what do you need public and private keys for, how to encrypt, digitally sign, authenticate, how secure is the whole thing and what does this security depend on?

The course provides not only answers to these and many other questions, but a comprehensive insight into the subject matter


End users who want to get an insight into the operation and use of certificates for the purpose of encrypting a communication.


There are no prerequisites required.


By participating in the workshop, safe handling of certificates is possible. The security and confidentiality of communications can be estimated and assessed


The workshop consists of a mixture of theory and practice. After various topics have been demonstrated, the participants have the opportunity to implement them themselves.


The main focus of the workshop is the visual expression of the complex subject matter. Key topics are asymmetric encryption, operation and characteristics of key pairs, the path from the public key to the certificate, and the use of certificates to encrypt a communication.

  •  Cryptographic principles and terminology
  •  Symmetric encryption
  •  Asymmetric encryption
  •  Hash Algorithms (MD5, SHA-1, SHA-256)
  •  Hash-based Message Authentication Code (HMAC)
  •  Key pairs (public key, private key) Features and functions of key pairs
  •  cryptosystems (RSA, DSA)
  •  Key exchange with RSA
  •  Key exchange according to Diffie-Hellman
  •  Digital signature
  •  Authentication with keys
  •  From the public key to the certificate
  •  Certificate Signing Request (CSR)
  •  Certification bodies (CA)
  •  X.509 certificates
  •  Certificate chains, reasons for certificate chains
  •  Public Key Infrastructure (PKI)
  •  Important standards, X.500, X.509
  •  X.509 certificates, fields, and content
  •  Configuration of subscriber and Relying Party (web server and browser)
  •  Certificate formats and conversion (PEM, DER, PKCS # 7, PKCS # 12)
  •  Protocols (HTTPS, FTPS, SFTP, SRTP, SSH)
  •  Practical examples (web server, OpenSSL, SSH)


2 days


Dates on request