top of page

Security Webinar Schedule

  • Session 1: Fundamentals of Cryptography

    • Feb 23, 2023

  • Session 2: Fundamentals of Cryptography

    • April 20, 2023

  • Session 3: Fundamentals of Cryptography

    • May 18, 2023

  • Session 4: How does TLS Work? (up to 1.3)

    • June 15, 2023

  • Session 5: How does TLS 1.3 Work?

    • Aug 10, 2023

  • Session 6: Introduction to MLS

    • Sept 14, 2023

Introduction to MLS

Oct 12, 2023

8:30 PM IST

Nalini Elkins

[Video] [Slides]

[Register]

Messaging applications are widely used to send text messages, multimedia messages, or other forms of communication between individuals or groups. These applications are typically designed for instant messaging and real-time communication.  Some sample messaging applications include: WhatsApp, Facebook Messenger, Telegram, Signal, iMessage, Slack, Microsoft Teams, Skype and others.  These are just a few examples of messaging applications, and there are many others available, each with its own unique features and focus. The choice of messaging app often depends on individual preferences, security concerns, and the specific needs of the user or organization.

 

Several widely-deployed messaging applications have developed their own protocols. While these protocols are similar, no two are close enough to interoperate. As a result, each application vendor has had to maintain their own protocol stack and independently build trust in the quality of the protocol. The goal of the MLS working group is to develop a standard messaging security protocol for human-to-human(s) communication with the above security and deployment properties so that applications can share code, and so that there can be shared validation of the protocol (as there has been with TLS 1.3).

 

This effort is likely to have a major impact on enterprises who use messaging application.  This session will explain the major components of MLS and some of the new security architecture.

Nalini started her career doing network design and monitoring for the Chevron network.  She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks. 

One of her specialties is training and network design for IPv6 migration for large enterprises.  Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.

She has developed network monitoring and diagnostic products which were later marketed by IBM and other software companies.   She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field.   Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).

How does TLS 1.3 work?

Aug 10, 2023

8:30 PM IST

Nalini Elkins

[Video] [Slides]

[Register]

TLS 1.3, the latest version of the Transport Layer Security protocol, brings forth significant advancements and improvements over its predecessors. In this discussion, we will delve into some of the key changes introduced by TLS 1.3, namely the increased encryption in the handshake process, deprecation of specific key exchange algorithms, and the introduction of new extensions. Additionally, we will explore the implications of TLS 1.3 on network management within enterprises.

Nalini started her career doing network design and monitoring for the Chevron network.  She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks. 

One of her specialties is training and network design for IPv6 migration for large enterprises.  Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.

She has developed network monitoring and diagnostic products which were later marketed by IBM and other software companies.   She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field.   Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).

Understanding TLS and the Handshake

Jun 15, 2023

8:30 PM IST

Nalini Elkins

[Video] [Slides]

[Register]

In this one-hour webinar, we will delve into the world of Transport Layer Security (TLS) and focus on one of its fundamental components, the handshake. TLS is a cryptographic protocol widely used to secure communication over computer networks. By analyzing packet traces, we will demystify the TLS handshake process, step by step, and gain a comprehensive understanding of how it establishes secure connections.

Webinar Agenda:

  • The importance of TLS and secure communication

  • Overview of the TLS protocol

  • Explanation of its role in securing network communications

  • Discussion on the importance of the handshake process

  • A step-by-step breakdown of the TLS handshake process

  • Highlighting key TLS handshake message types and their significance

 

By the end of this webinar, participants will have a solid understanding of the TLS protocol, its handshake mechanism, and the role of packet traces in analyzing and troubleshooting TLS connections. Armed with this knowledge, attendees will be better equipped to secure their network communications and diagnose potential issues in TLS implementations.

Nalini started her career doing network design and monitoring for the Chevron network.  She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks. 

One of her specialties is training and network design for IPv6 migration for large enterprises.  Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.

She has developed network monitoring and diagnostic products which were later marketed by IBM and other software companies.   She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field.   Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).

Fundamentals of Cryptography - III

May 18, 2023

8:30 PM IST

Nalini Elkins

[Video] [Slides]

[Register]

This webinar is a part of the Cryptography webinar series.

Nalini started her career doing network design and monitoring for the Chevron network.  She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks. 

One of her specialties is training and network design for IPv6 migration for large enterprises.  Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.

She has developed network monitoring and diagnostic products which were later marketed by IBM and other software companies.   She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field.   Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).

Fundamentals of Cryptography - II

Apr 20, 2023

8:30 PM IST

Nalini Elkins

[Video] [Slides]

[Register]

The goal for the second security session is to understand some of the terms which are crucial to cryptography.  The explanation will be for those implementing security protocols rather than academics or cryptographers. We will cover:

  • DES

  • 3DES

  • Asymmetric encryption / symmetric encryption

  • Elliptic curve cryptography

  • Certificate authorities

  • Diffie-Hellman key exchange

  • Diffie-Hellman groups

  • Hashed message authentication code (HMAC)

  • Message authentication code (MAC)

  • Message digest algorithm 5 (MD5)

  • Rivest Shamir Adleman (RSA)

  • Secure hash algorithm (SHA)

  • X.500 distinguished name

  • X.509 digital certificates

 

Nalini started her career doing network design and monitoring for the Chevron network.  She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks. 

One of her specialties is training and network design for IPv6 migration for large enterprises.  Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.

She has developed network monitoring and diagnostic products which were later marketed by IBM and other software companies.   She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field.   Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).

Fundamentals of Cryptography - I

Feb 23, 2023

9:30 PM IST

Nalini Elkins

[Video] [Slides]

[Register]

The goal for the first security session is to understand some of the terms which are crucial to cryptography.  The explanation will be for those implementing security protocols rather than academics or cryptographers. We will cover:

  • DES

  • 3DES

  • Asymmetric encryption / symmetric encryption

  • Elliptic curve cryptography

  • Certificate authorities

  • Diffie-Hellman key exchange

  • Diffie-Hellman groups

  • Hashed message authentication code (HMAC)

  • Message authentication code (MAC)

  • Message digest algorithm 5 (MD5)

  • Rivest Shamir Adleman (RSA)

  • Secure hash algorithm (SHA)

  • X.500 distinguished name

  • X.509 digital certificates

 

Nalini started her career doing network design and monitoring for the Chevron network.  She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks. 

One of her specialties is training and network design for IPv6 migration for large enterprises.  Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.

She has developed network monitoring and diagnostic products which were later marketed by IBM and other software companies.   She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field.   Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).

bottom of page