SecAppDev 2024 lecture details
Crypto policy: from CSAM to eIDAS
This talk presents a summary of 30 years of crypto wars including the key escrow controversy, client-side scanning, and EU's digital identity initiatives.
Wednesday June 5th, 09:00 - 10:30
Room Lemaire
Download handoutsAbstract
This talk provides a concise exploration of the crypto wars, tracing the tensions between privacy advocates and government surveillance efforts. It delves into the concept of key escrow and its implications for encryption. Additionally, it examines the complexities surrounding client-side scanning for detecting child sexual abuse material. The talk concludes with a critical analysis of the European Digital Identity Wallet and eIDAS, highlighting their role in fostering secure and interoperable digital identities across the European Union.
Key takeaway
Technology developments create a growing tension between government mass surveillance and privacy; the resulting debate shifts shapes but continues.
Content level
Introductory
Target audience
Software developers, architects, people involved in governance
Prerequisites
None
Related lectures
Winning the war in cyber
Keynote lecture by Jessica Robinson in room Lemaire
Monday June 3rd, 09:15 - 10:30
How well we adapt continues to influence our security strategies, our creativity, and our culture, in our companies and in our industry. It seems starting with ourselves is a natural place to begin.
Key takeaway: What the evolution of the security practitioner, and leader, will look in the future in winning the daily battles in cybersecurity.
Cryptographic algorithms update
Deep-dive lecture by Bart Preneel in room Lemaire
Monday June 3rd, 14:00 - 15:30
An update on the most important cryptographic algorithms and a status on the migration towards post-quantum security.
Key takeaway: Which cryptographic algorithms to use for which tasks.
Practical cryptography with Tink
Deep-dive lecture by Neil Madden in room West Wing
Monday June 3rd, 16:00 - 17:30
Learn how to translate cryptography know-how into robust working code that is easy to review. Avoid common implementation pitfalls by learning how to use the modern Tink cryptographic library.
Key takeaway: Learn how to use Tink to implement cryptographic features and protocols in a robust manner.