<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cryptography, need to go down the rabbit hole, suggestions ? in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13266#M382</link>
    <description>&lt;P&gt;If you have a CA you need HSM's to protect your private keys.&amp;nbsp; Cloud HSM's are in their infancy and VERY costly. I am still recommending on-prem HSM's until the market has more competition/saturation/security to be able to recommend cloud solutions for that.&amp;nbsp; One of my close fishing buddies is with a leading HSM vendor and over plastic baits and missed hooksets we discuss this.&amp;nbsp; Amazon uses this vendors gear and I know firsthand how it is designed.&amp;nbsp; Remember that unless the HSM is FULLY in YOUR control you are NOT in control of your private keys.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In my world, as contractor to FEDCIV and DoD, I'm always supporting the internal CA for those tokens issued to admins and internal certs issued to servers (SSL).&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Personally, I read vendor literature more then I do anything else.&amp;nbsp; That is where you learn the technology.&amp;nbsp; Key in on MS AD and CA tech. When you have LDAP, CA and auth all tied together you learn a lot!&lt;/P&gt;</description>
    <pubDate>Mon, 06 Aug 2018 11:57:20 GMT</pubDate>
    <dc:creator>Flyslinger2</dc:creator>
    <dc:date>2018-08-06T11:57:20Z</dc:date>
    <item>
      <title>Cryptography, need to go down the rabbit hole, suggestions ?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13257#M378</link>
      <description>&lt;P&gt;My dear fellow colleagues,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After having passed CISSP last year I would like to get more knowledge on cryptography. Practical stuff like lifecycle, key management, crypto-period, best type of algo for specific usage, cloud &amp;amp; in-house HSM for keygen and signing&amp;nbsp;etc...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The intro in CISSP was great but I want more hands on, use-case knowledge etc... Any books or online courses that you could recommend me ? Fyi, I'm less interested in the mathematical side of things.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thank you for your advice&lt;/P&gt;</description>
      <pubDate>Sun, 05 Aug 2018 20:56:15 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13257#M378</guid>
      <dc:creator>benjaminb</dc:creator>
      <dc:date>2018-08-05T20:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptography, need to go down the rabbit hole, suggestions ?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13259#M379</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/618166341"&gt;@benjaminb&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is a stack of resources available on this subject:&amp;nbsp; Just doing an Amazon.com look for books on cryptography for instance will turn up:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Serious Cryptography:&amp;nbsp; A Practical Introduction to Modern Encryption - November 2017&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.amazon.com/gp/product/1593278268/ref=s9_acsd_zwish_hd_bw_b10V_c_x_2_w/143-9844400-5655918?pf_rd_m=ATVPDKIKX0DER&amp;amp;pf_rd_s=merchandised-search-8&amp;amp;pf_rd_r=GYFVV9MNR3E5YAWDV337&amp;amp;pf_rd_t=101&amp;amp;pf_rd_p=050ec37d-d025-58af-b019-051dfb9ea4bb&amp;amp;pf_rd_i=3875#reader_1593278268" target="_blank"&gt;https://www.amazon.com/gp/product/1593278268/ref=s9_acsd_zwish_hd_bw_b10V_c_x_2_w/143-9844400-5655918?pf_rd_m=ATVPDKIKX0DER&amp;amp;pf_rd_s=merchandised-search-8&amp;amp;pf_rd_r=GYFVV9MNR3E5YAWDV337&amp;amp;pf_rd_t=101&amp;amp;pf_rd_p=050ec37d-d025-58af-b019-051dfb9ea4bb&amp;amp;pf_rd_i=3875#reader_1593278268&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Applied Cryptography:&amp;nbsp; Protocols, Algorithms and Source Code in C - 20th edition&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.amazon.com/dp/1119096723/ref=rdr_ext_tmb#reader_1119096723" target="_blank"&gt;https://www.amazon.com/dp/1119096723/ref=rdr_ext_tmb#reader_1119096723&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But if you have access to University or IEEE resources, they have plenty of resources open to you to study with the appropriate level of mathematics.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cautim_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But whilst you at it, I suggest you also look at Quantum Cryptography, which will make most of the traditional algorithms redundant.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Aug 2018 22:26:28 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13259#M379</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-08-05T22:26:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptography, need to go down the rabbit hole, suggestions ?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13260#M380</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your input. Yeah it seems quantum crypto will also be a killer for some cryptocurrency.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://thenextweb.com/contributors/2018/04/14/quantum-computing-wreak-havoc-cryptocurrency/" target="_blank"&gt;https://thenextweb.com/contributors/2018/04/14/quantum-computing-wreak-havoc-cryptocurrency/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PCI DSS standard seems like a very good place to start too. Most HSM's are used in the financial industry anyways.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Aug 2018 23:47:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13260#M380</guid>
      <dc:creator>benjaminb</dc:creator>
      <dc:date>2018-08-05T23:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptography, need to go down the rabbit hole, suggestions ?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13266#M382</link>
      <description>&lt;P&gt;If you have a CA you need HSM's to protect your private keys.&amp;nbsp; Cloud HSM's are in their infancy and VERY costly. I am still recommending on-prem HSM's until the market has more competition/saturation/security to be able to recommend cloud solutions for that.&amp;nbsp; One of my close fishing buddies is with a leading HSM vendor and over plastic baits and missed hooksets we discuss this.&amp;nbsp; Amazon uses this vendors gear and I know firsthand how it is designed.&amp;nbsp; Remember that unless the HSM is FULLY in YOUR control you are NOT in control of your private keys.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In my world, as contractor to FEDCIV and DoD, I'm always supporting the internal CA for those tokens issued to admins and internal certs issued to servers (SSL).&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Personally, I read vendor literature more then I do anything else.&amp;nbsp; That is where you learn the technology.&amp;nbsp; Key in on MS AD and CA tech. When you have LDAP, CA and auth all tied together you learn a lot!&lt;/P&gt;</description>
      <pubDate>Mon, 06 Aug 2018 11:57:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13266#M382</guid>
      <dc:creator>Flyslinger2</dc:creator>
      <dc:date>2018-08-06T11:57:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptography, need to go down the rabbit hole, suggestions ?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13271#M383</link>
      <description>&lt;P&gt;Is a good rabbit hole to go into. I have worked both offensive and defensive security in my 15 yrs. Currently focusing on Cryptographic solutions for a financial services organization. I recommend further reading as suggested, but to also follow what some of the vendors are doing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://software.microfocus.com/en-us/products/voltage-data-encryption-security/overview" target="_blank"&gt;https://software.microfocus.com/en-us/products/voltage-data-encryption-security/overview&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.pkware.com/" target="_blank"&gt;https://www.pkware.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.ibm.com/us-en/marketplace/guardium-file-and-database-encryption" target="_blank"&gt;https://www.ibm.com/us-en/marketplace/guardium-file-and-database-encryption&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the grand scheme of things it is all about data protection. Protecting data at rest, data in use, data in transit. Congrats on passing your exam and welcome to the ISC2 family....&lt;/P&gt;</description>
      <pubDate>Mon, 06 Aug 2018 13:48:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13271#M383</guid>
      <dc:creator>janespa</dc:creator>
      <dc:date>2018-08-06T13:48:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptography, need to go down the rabbit hole, suggestions ?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13273#M384</link>
      <description>Great advice thank you. We went for an onprem solution too. Have requested all the documentation for the HSM's that my customer has bought so that I can dive into it.</description>
      <pubDate>Mon, 06 Aug 2018 13:56:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13273#M384</guid>
      <dc:creator>benjaminb</dc:creator>
      <dc:date>2018-08-06T13:56:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptography, need to go down the rabbit hole, suggestions?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13292#M385</link>
      <description>&amp;gt; benjaminb (Viewer) posted a new topic in Tech Talk on 08-05-2018 04:56 PM in the&lt;BR /&gt;&lt;BR /&gt;&amp;gt; My dear fellow colleagues, &amp;nbsp; After having passed CISSP last year I would like&lt;BR /&gt;&amp;gt; to get more knowledge on cryptography.&lt;BR /&gt;&lt;BR /&gt;OK, since you've already passed, I won't recommend "Internet Cryptography" by&lt;BR /&gt;Richard E. Smith and "Cryptography Decrypted" by H. X. Mel and Doris Baker.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Practical stuff like lifecycle, key&lt;BR /&gt;&amp;gt; management, crypto-period, best type of algo for specific usage, cloud &amp;amp;&lt;BR /&gt;&amp;gt; in-house HSM for keygen and signing&amp;nbsp;etc... &amp;nbsp; The intro in CISSP was great but&lt;BR /&gt;&amp;gt; I want more hands on, use-case knowledge etc... Any books or online courses that&lt;BR /&gt;&amp;gt; you could recommend me ? Fyi, I'm less interested in the mathematical side of&lt;BR /&gt;&amp;gt; things.&lt;BR /&gt;&lt;BR /&gt;Ah, it's always the implementation details. Sadly, those are not one-size-fits-all,&lt;BR /&gt;so you won't find them directly in the literature. But:&lt;BR /&gt;&lt;BR /&gt;"Applied Cryptography" by Bruce Schneier is an excellent and thorough text,&lt;BR /&gt;intro or reference for professional or serious hobbyist. And *I* say it's readable,&lt;BR /&gt;too, as is pretty much anything Schneier writes. (I find the simpler texts do not&lt;BR /&gt;have sufficient depth in one area or another.) Yes, it has a lot of math, but it also&lt;BR /&gt;has explanations of the math, so, if you don't like math, just read the&lt;BR /&gt;explanations. You will find that anyone who is into programming of crypto hates&lt;BR /&gt;Schneier, and says that his code is crap, which is true. Depends on if you just want&lt;BR /&gt;to steal someone's code, or actually understand crypto.&lt;BR /&gt;&lt;A href="http://victoria.tc.ca/int-grps/books/techrev/bkapcryp.rvw" target="_blank"&gt;http://victoria.tc.ca/int-grps/books/techrev/bkapcryp.rvw&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;"Decrypted Secrets", F. L. Bauer&lt;BR /&gt;good general coverage.&lt;BR /&gt;&lt;A href="http://victoria.tc.ca/int-grps/books/techrev/bkdecsec.rvw" target="_blank"&gt;http://victoria.tc.ca/int-grps/books/techrev/bkdecsec.rvw&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;One general cryptography textbook, "The Handbook of Applied Cryptography,"&lt;BR /&gt;by Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, is available&lt;BR /&gt;online, but it is heavily into mathematics, with very little in the way of general&lt;BR /&gt;explanations.&lt;BR /&gt;&lt;A href="http://www.cacr.math.uwaterloo.ca/hac/" target="_blank"&gt;http://www.cacr.math.uwaterloo.ca/hac/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;"Information Security: Principles and Practice" by Mark Stamp is solid.&lt;BR /&gt;&lt;BR /&gt;"The Codebreakers" by David Kahn, will give you nothing about the technology,&lt;BR /&gt;but, being a history, will give you pointers to the implementation dangers you&lt;BR /&gt;want.&lt;BR /&gt;&lt;BR /&gt;For more specialized areas:&lt;BR /&gt;&lt;BR /&gt;"Cryptography and Network Security", William Stallings&lt;BR /&gt;able reference and tutorial, also:&lt;BR /&gt;&lt;A href="http://victoria.tc.ca/int-grps/books/techrev/bkcrntsc.rvw" target="_blank"&gt;http://victoria.tc.ca/int-grps/books/techrev/bkcrntsc.rvw&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;"Network and Internetwork Security", William Stallings&lt;BR /&gt;another classic from Stallings, primarily on encryption.&lt;BR /&gt;&lt;A href="http://victoria.tc.ca/int-grps/books/techrev/bkntinsc.rvw" target="_blank"&gt;http://victoria.tc.ca/int-grps/books/techrev/bkntinsc.rvw&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;"SSL and TLS: Theory and Practice", Rolf Oppliger&lt;BR /&gt;SSL is a bit specialized, but it is widely used and important. More significantly,&lt;BR /&gt;however, Oppliger's work is exemplary in both explaining the technology, and&lt;BR /&gt;dealing with the practicalities and implementations. (In fact, I'm not sure whether&lt;BR /&gt;this should be here or in telecom.)&lt;BR /&gt;&lt;A href="http://victoria.tc.ca/int-grps/books/techrev/bksslttp.rvw" target="_blank"&gt;http://victoria.tc.ca/int-grps/books/techrev/bksslttp.rvw&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;"Cryptanalysis", Helen Fouche Gaines&lt;BR /&gt;was written in 1939, so it will NOT help you through the exam, but it's an&lt;BR /&gt;intriguing look at the various ciphers developed over the years, and the great ways&lt;BR /&gt;people have created to break them. Again, implementation details.&lt;BR /&gt;&lt;A href="http://victoria.tc.ca/int-grps/books/techrev/bkcrptan.rvw" target="_blank"&gt;http://victoria.tc.ca/int-grps/books/techrev/bkcrptan.rvw&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;If men use their liberty in such a way as to surrender their&lt;BR /&gt;liberty, are they thereafter any the less slaves? If people by a&lt;BR /&gt;plebiscite elect a man despot over them, do they remain free&lt;BR /&gt;because the despotism was of their own making? Are the coercive&lt;BR /&gt;edicts issued by him to be regarded as legitimate because they&lt;BR /&gt;are the ultimate outcome of their own votes?&lt;BR /&gt;- Herbert Spencer (1820-1903), The Man versus the State (1884)&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://www.infosecbc.org/links" target="_blank"&gt;http://www.infosecbc.org/links&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;</description>
      <pubDate>Mon, 06 Aug 2018 19:09:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13292#M385</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2018-08-06T19:09:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptography, need to go down the rabbit hole, suggestions ?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13293#M386</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;BR /&gt;&lt;P&gt;But whilst you at it, I suggest you also look at Quantum Cryptography, which will make most of the traditional algorithms redundant.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;A href="http://itsecurity.co.uk/2016/09/security-implications-quantum-computing/" target="_blank"&gt;QUANTUM CRYPTOGRAPHY&lt;/A&gt; IS &lt;A href="http://itsecurity.co.uk/2016/09/cryptography-quantum-computing/" target="_blank"&gt;NOT CRYPTOGRAPHY&lt;/A&gt;, IT'S JUST *^^*%$^&amp;amp;*&amp;amp; &lt;A href="https://www.welivesecurity.com/2014/01/24/rob-slade-the-truth-about-quantum-cryptography-and-what-it-means-for-privacy/" target="_blank"&gt;KEY EXCHANGE&lt;/A&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I have tried diligently to point out in numerous articles, postings, and conference presentations ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(Sorry.&amp;nbsp; I have to go lie down, now ...)&lt;/P&gt;</description>
      <pubDate>Mon, 06 Aug 2018 19:17:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13293#M386</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2018-08-06T19:17:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptography, need to go down the rabbit hole, suggestions ?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13294#M387</link>
      <description>&lt;P&gt;And &lt;A href="https://urbigenous.net/library/alicebob.html" target="_blank"&gt;Alice and Bob&lt;/A&gt; both agree with me ...&lt;/P&gt;</description>
      <pubDate>Mon, 06 Aug 2018 19:21:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13294#M387</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2018-08-06T19:21:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptography, need to go down the rabbit hole, suggestions ?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13295#M388</link>
      <description>Relax, keep taking the heart pills. I agree by the way.</description>
      <pubDate>Mon, 06 Aug 2018 19:25:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/13295#M388</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-08-06T19:25:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptography, need to go down the rabbit hole, suggestions?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/15056#M485</link>
      <description>&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt; , thank you. Am definitely going to go through these book reviews of yours . Bit of a treasure trove !</description>
      <pubDate>Thu, 27 Sep 2018 22:29:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/15056#M485</guid>
      <dc:creator>benjaminb</dc:creator>
      <dc:date>2018-09-27T22:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: benjaminb mentioned you in (ISC)Â² Community</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/15068#M486</link>
      <description>&amp;gt; benjaminb (Newcomer I) mentioned you in a post! Join the conversation below:&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt; , thank you. Am definitely going to go through these book reviews of&lt;BR /&gt;&amp;gt; yours . Bit of a treasure trove !&lt;BR /&gt;&lt;BR /&gt;Quite welcome ...&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;Every gun that is made, every warship launched, every rocket&lt;BR /&gt;fired, signifies in the final sense a theft from those who hunger&lt;BR /&gt;and are not fed, those who are cold and are not clothed.&lt;BR /&gt;- President Dwight Eisenhower&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt;</description>
      <pubDate>Fri, 28 Sep 2018 17:46:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/15068#M486</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2018-09-28T17:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptography, need to go down the rabbit hole, suggestions?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/15086#M487</link>
      <description>&lt;P&gt;Some great resources listed in this thread. I would add NIST's guidance on:&lt;/P&gt;&lt;P&gt;key management (SP 800-57 parts 1, 2 and 3 as well as SP 800-131A)&amp;nbsp;&lt;A href="https://csrc.nist.gov/projects/key-management/key-management-guidelines" target="_blank"&gt;https://csrc.nist.gov/projects/key-management/key-management-guidelines&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;and key establishment&amp;nbsp;&lt;A href="https://csrc.nist.gov/Projects/Key-Management/Key-Establishment" target="_blank"&gt;https://csrc.nist.gov/Projects/Key-Management/Key-Establishment&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Cloud Security Alliance is accepting contributions to their draft Cloud Key Management charter up until the end of next month. &lt;A href="https://cloudsecurityalliance.org/group/cloud-key-management/#_overview" target="_blank"&gt;https://cloudsecurityalliance.org/group/cloud-key-management/#_overview&lt;/A&gt; If you have time, you may want to get involved in that working group. I learned a great deal from my involvement in the NIST Cloud Computing Security working group and the NIST Cloud Forensic Science working group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Sep 2018 06:08:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/15086#M487</guid>
      <dc:creator>Markonweb</dc:creator>
      <dc:date>2018-09-30T06:08:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptography, need to go down the rabbit hole, suggestions?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/15090#M488</link>
      <description>&lt;P&gt;More stuffs here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://download.pgp.com/pdfs/Intro_to_Crypto_040600_F.pdf" target="_self"&gt;http://download.pgp.com/pdfs/Intro_to_Crypto_040600_F.PDF&lt;/A&gt;&amp;nbsp;chapter two is a a bit of a product pitch, but even though it’s long in the tooth it’s a nice primer. Written by some interesting folks it’s a nice read in of itself.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=kmip" target="_self"&gt;https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=kmip&lt;/A&gt;&amp;nbsp;Didn’t see this added by previous posters, and it’s in the rabbit hole, so I’ll put it in. A lot of conference material was put online as well, and is pretty searchable.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Sep 2018 15:35:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Cryptography-need-to-go-down-the-rabbit-hole-suggestions/m-p/15090#M488</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2018-09-30T15:35:11Z</dc:date>
    </item>
  </channel>
</rss>

