Skip to main content

Currently Skimming:

Workshop Introduction
Pages 1-6

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 1...
... Eckert Professor of Computer Science at Cornell University, member of the National Academy of Engineering, and workshop chair, opened the meet ing with a brief description of the National Academies' Forum on Cyber Resilience. The forum convenes experts from various backgrounds to examine the complicated issues 1
From page 2...
... Schneider also drew attention to some immediately practical issues, beyond devel oping defenses against hypothetical quantum computers, that improvements in crypto graphic agility could help address. For example, what happens when foreign nations or other entities want to add their own cryptographic suites to commodity software, instead of using cryptographic approaches provided by the manufacturer?
From page 3...
... Cryptographic Agility and Interoperability 3
From page 4...
... The Forum on Cyber Resilience fa cilitates and enhances the exchange of ideas among scientists, practitioners, and policy makers who are concerned with urgent and important issues related to the resilience of the nation's computing and communications systems, including the Internet, other critical infrastructures, and commercial systems. Forum activities help to inform and engage a broad range of stakeholders around issues related to technology and policy in the context of cyber resilience, cybersecurity, privacy, and related emerging issues.
From page 5...
... Challenges related to cryptographic agility cover the following areas: • Cryptographic algorithms -- algorithm-specific cryptanalytic advances or fundamentally new techniques (such as quantum computing) may necessitate algorithm replacements; • Cryptographic protocols -- updates to how cryptographic protocols negotiate and use cryptographic methods and other agreements may be needed to address security issues or to add/remove functionality; • Endpoints -- cryptographic implementations in endpoint devices and systems range from more agile approaches (such as updatable software)
From page 6...
... For example, how easy is it today to replace defeated or outdated cryptographic tools in widely deployed commercial software and systems? How should the trade-off be made between supporting multiple algorithms (thus enabling agility in case of future prob lems)


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.