INTERPOL & GLACY+ Technical Webinars: Crypto for Criminal Justice Authorities
PRACTICAL INFO
WEBINAR 1 - Hash and crypto essentials
Speakers
- Dong Uk KIM, INTERPOL GLACY+ Project
- Carlos PIMENTEL, Portuguese Guarda Nacional Republicana
- Alvaro ORTIGOSA, Universidad Autónoma de Madrid
Date and time
- Tuesday, 1 December 2020 | 01:00 PM UTC
Duration and language
- 1h 30 min | English only
Audience
- Officials from criminal justice authorities (law enforcement officers, prosecutors, judges and others, instructors of governmental institutions responsible for the training on the same topic)
Outline
WEBINAR 2 - Symmetric cryptography
Speakers
- Dong Uk KIM, INTERPOL GLACY+ Project
- Carlos PIMENTEL, Portuguese Guarda Nacional Republicana
- Alvaro ORTIGOSA, Universidad Autónoma de Madrid
Date and time
- Thursday, 3 December 2020 | 01:00 PM UTC
Duration and language
- 1h 30 min | English only
Audience
- Officials from criminal justice authorities (law enforcement officers, prosecutors, judges and others, instructors of governmental institutions responsible for the training on the same topic)
Outline
WEBINAR 3 - Asymmetric cryptography
Speakers
- Dong Uk KIM, INTERPOL GLACY+ Project
- Carlos PIMENTEL, Portuguese Guarda Nacional Republicana
- Alvaro ORTIGOSA, Universidad Autónoma de Madrid
Date and time
- Monday, 7 December 2020 | 01:00 PM UTC
Duration and language
- 1h 30 min | English only
Audience
- Officials from criminal justice authorities (law enforcement officers, prosecutors, judges and others, instructors of governmental institutions responsible for the training on the same topic)
Outline
WEBINAR 4 - Trust in Internet - digital certificates
Speakers
- Dong Uk KIM, INTERPOL GLACY+ Project
- Belhassen ZOUARI, University of Carthage, Carthage
Date and time
- Tuesday, 8 December 2020 | 01:00 PM UTC
Duration and language
- 1h 30 min | English only
Audience
- Officials from criminal justice authorities (law enforcement officers, prosecutors, judges and others, instructors of governmental institutions responsible for the training on the same topic)
Outline
WEBINAR 5 - Fundamentals of Crypto-currencies
Speakers
- Dong Uk KIM, INTERPOL GLACY+ Project
- Mark van STAALDUINEN, CFLW Cyber Strategies
Date and time
- Thursday, 10 December 2020 | 01:00 PM UTC
Duration and language
- 1h 30 min | English only
Audience
- Officials from criminal justice authorities (law enforcement officers, prosecutors, judges and others, instructors of governmental institutions responsible for the training on the same topic)
Outline
DETAILS
Background
As the use of and reliance on information technology becomes more and more pervasive in society, the targeting and exploitation of computer systems has also become increasingly common. Offences involving computers have grown rapidly both in number and in sophistication, and criminal justice authorities are called to face an ever-increasing number of challenges in order to ensure efficient investigation and successful prosecution of related crimes. Many countries have undertaken efforts in recent years to establish specialized cybercrime units at the level of police authorities, as well as units responsible for digital forensics.
Cryptography is the one of the core technological enabler of the information technology being so widely received by the public. Without it, the little trust in the Internet would have prevented the network to grow so large. However, the knowledge of cryptography has not been covered enough in the context of the law enforcement training. In the framework of GLACY+ project, this training topic was first piloted in the first responder training hosted by the European Cybercrime Training and Education Group (ECTEG) and INTERPOL in September 2020 as part of the E-First package.
Cryptography is the one of the core technological enabler of the information technology being so widely received by the public. Without it, the little trust in the Internet would have prevented the network to grow so large. However, the knowledge of cryptography has not been covered enough in the context of the law enforcement training. In the framework of GLACY+ project, this training topic was first piloted in the first responder training hosted by the European Cybercrime Training and Education Group (ECTEG) and INTERPOL in September 2020 as part of the E-First package.
Objectives
- Webinar 1 - To start the first of the series, we aim to discuss the characteristics of the hash function, and why it is useful in information security as well as in electronic evidence. We will continue discuss on the basic concepts of ancient cryptography and cryptanalysis as a primer to the modern cryptography to be followed in coming webinars.
- Webinar 2 - Modern cryptography came with automation. In the webinar we will visit how the information is kept confidential using the cryptographic algorithms and security of secret keys. We will then address the difficult question of how two communication parties can share a common secret key, without meeting each other before the communication.
- Webinar 3 - The number of keys exponentially becomes too many as newer members participate in the Internet. In this webinar, we discuss on how the reusable keys are developed, and how the public-key encryption can provide the new capability of entity verification.
- Webinar 4 - One of the application of cryptography is the green pad-lock on the address bars of some modern web browsers. It gives the users the sense of security. In this webinar we discuss how the HTTPS works and how much trust we can give to these pad-locks.
- Webinar 5 - Hash and public key encryption enables the cryptocurrencies and dark net. We will briefly go through what cryptographic technologies are used to make these applications possible.
Expected outcomes
The first part of the webinars (1,2 and 3) aim to provide knowledge and conceptual understanding of cryptography necessary to conduct daily duties for the criminal justice authority officials. After the webinars, the participants will discover:
- Characteristics and capabilities of good cryptographic hash function
- How passwords are stored and stolen
- Conceptual orientation of algorithms in the context of ancient cryptography
- Modern block symmetric cryptography and the capabilities it provides
- How two parties can share secret key in the presence of eavesdropper (internet)
- Why reusable public keys are useful for network with large participants
- How the concept of public key was realized (example of RSA).
- Non-repudiation capabilities of public key encryption
In the webinar 4 and 5, the participants will have chance to discuss with the speakers on more applied real life examples of cryptography-induced trust.
- How the public key encryption were applied to become the pad-lock icon (https) in the address bar of the web-browser.
- How much trust can we give to the certificates, and why (HTTPs: who verifies the entity, and how?)
- How hashing and public key encryption applied in Blockchain and cryptocurrency transactions in Bitcoin.
Resources
- Council of Europe, The Budapest Convention and related standards
- Council of Europe, Standard Operating Procedures for the collection, analysis and presentation of electronic evidence (upon request)
- Council of Europe, Electronic Evidence Guide (upon request)
- Council of Europe, Digital Forensic Lab Guide