RSS

Dallas C# SIG August Meeting: Cryptography Ghost Stories

0 Comments | This entry was posted on Jul 22 2014

Register for the meeting here.

Abstract

Heartbleed. Target. Safari. Snapchat. NSA.

If you don’t understand how cryptography works, you are in real danger of misusing it. Such mistakes can be extremely costly. It doesn’t have to be difficult. The mathematics behind modern cryptography is surprisingly simple.

It isn’t the complexity of the math that makes digital cryptography effective. On the contrary, the simplicity of the math gives us confidence that we’ve learned enough about the space to trust the results. I’ll show you the formulas, and demonstrate exactly why — and how far — you can trust them.

Michael Perry’s Bio

Software is math. Every class is a theorem. The compiler is the proof. And unit tests check our work.

Michael has recorded Pluralsight courses on CQRS, XAML Patterns, and Cryptography, in addition to Provable Code. He maintains the spoon-bending Update Controls and Correspondence open-source libraries. And he helps his clients at Improving Enterprises benefit from the power of software mathematics. You can find out more at qedcode.com.

Schedule

Date: August 07, 2014
6:00 – 6:30 p.m : Networking/Pizza
6:30 – 8:30 p.m : Main Presentation
8:30 p.m              : Door Prizes