We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Custom Crypto Policies by Examples

00:00

Formal Metadata

Title
Custom Crypto Policies by Examples
Subtitle
Management of crypto algorithm restrictions
Title of Series
Number of Parts
490
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Management of allowed cryptographical algorithms to disallow algorithms not allowed due to weaknesses or restrictions by certification standards is complicated task. The talk will introduce system-wide crypto-policies concept and implementation as an attempt to help system administrators with this task. This talk replaces "OSINT" talk which was schedulled initially, but David Busby could not attend on the short notice. The system-wide crypto-policies were introduced in Fedora 21 in 2014. Since that time the tool evolved a lot especially with the recent introduction of run-time generation of configuration from a policy definition file and introduction of sub-policy concept. The feature is called Custom crypto policies. The crypto-policies nowadays help management of crypto algorithms not only in Fedora but also in Red Hat Enterprise Linux 8. It will be shown how the policy definition file looks like and how it is converted to the actual crypto library configuration.
CryptographyAlgorithmInformation managementCryptographySoftware engineeringPrincipal idealLecture/Conference
CryptographyAdditionLecture/Conference
CryptanalysisEvoluteCryptographyTerm (mathematics)Communications protocolMathematicsAlgorithmLecture/Conference
Communications protocolMathematicsVirtual machineSet (mathematics)Configuration spaceLevel (video gaming)SoftwareDifferent (Kate Ryan album)AlgorithmLine (geometry)CryptographyWeb 2.0Lecture/Conference
Computer fileCore dumpLibrary (computing)Physical systemConfiguration spaceAsynchronous Transfer ModeMultiplication signBootingAlgorithmMultiplicationMathematicsLevel (video gaming)Cartesian coordinate systemSymmetric matrixParameter (computer programming)Transport Layer SecurityDefault (computer science)Information securityMatching (graph theory)CryptographyRevision controlOcean currentData managementFlow separationImplementationTelecommunicationLecture/Conference
DampingLevel (video gaming)CryptographyElectronic signatureParameter (computer programming)Computer fileConfiguration spaceLibrary (computing)Front and back endsLimit (category theory)Normal (geometry)Symmetric matrixLengthSchlüsselverteilungElectronic mailing listHash functionMaxima and minimaKey (cryptography)Revision controlGroup actionFile formatCASE <Informatik>AlgorithmModule (mathematics)MathematicsDifferent (Kate Ryan album)Lecture/Conference
Limit (category theory)Lecture/Conference
Key (cryptography)Public key certificateBitWebsiteRegular graphPressureCommunications protocolLibrary (computing)Electronic mailing listRevision controlFront and back endsTransport Layer SecurityGroup actionWeb browserSchlüsselverteilungAddress spaceConfiguration spaceLevel (video gaming)Multiplication signCartesian coordinate systemAlgorithmScripting languagePlanningComputer fileEncryptionElectric generatorComputer configurationError messageDampingCryptographyOrder (biology)Formal languageMultiplicationSelectivity (electronic)Ocean currentLecture/Conference
MultiplicationDampingSingle-precision floating-point formatFile formatCryptographyAlgorithmLevel (video gaming)Service (economics)Physical systemCASE <Informatik>Connected spaceClient (computing)System administratorServer (computing)Lecture/Conference
Point cloudOpen sourceFacebook
Transcript: English(auto-generated)