<div dir="ltr"><p style="margin-bottom:0cm;line-height:100%">Hello Fellow HACers,</p>
<p style="margin-bottom:0cm;line-height:100%">As you may recall
from our last meeting, a group of us got together to design a
syllabus for a proposed “International Masters Degree in
Crypto-Programming”.</p>
<p style="margin-bottom:0cm;line-height:100%">The modules we came
up with were</p>
<ul>
<li>
<p style="margin-bottom:0cm;line-height:100%">Crypto
(symmetric)</p>
</li><li>
<p style="margin-bottom:0cm;line-height:100%">Crypto
(Asymmetric)</p>
</li><li>
<p style="margin-bottom:0cm;line-height:100%">Architecture
and Embedded Programming</p>
</li><li>
<p style="margin-bottom:0cm;line-height:100%">Network
Security</p>
</li><li>
<p style="margin-bottom:0cm;line-height:100%">Crypto
Programming</p>
</li><li>
<p style="margin-bottom:0cm;line-height:100%">Side Channel
attacks/defences</p>
</li><li>
<p style="margin-bottom:0cm;line-height:100%">Protocols and
Standards</p>
</li><li>
<p style="margin-bottom:0cm;line-height:100%">Secure
Programming</p>
</li><li>
<p style="margin-bottom:0cm;line-height:100%">Formal
Methods, Verification and Testing</p>
</li><li>
<p style="margin-bottom:0cm;line-height:100%">Crypto law
and Ethics</p></li></ul>
<p style="margin-bottom:0cm;line-height:100%">There was also to be
a final “Practicum”/Mini-Thesis component. None of this was
finalized or set in stone, not even the name of the degree.</p>
<p style="margin-bottom:0cm;line-height:100%">We can as a group
advance this project in a number of ways. Most obviously, if the
above list of modules is acceptable as a starting point, then there
is a need to flesh out each module in much more detail.</p>
<p style="margin-bottom:0cm;line-height:100%">To briefly recap on
the motivation:</p>
<p style="margin-bottom:0cm;line-height:100%">If our aim is to
encourage the development of High Assurance Crypto Software, then
education needs to be a big part of that. We can all point to horror
stories about poor quality crypto code. However a lot of that, I
would suggest, is down to an educational deficit, rather than just
reckless incompetence.</p>
<p style="margin-bottom:0cm;line-height:100%">A lot of real-world
crypto code is being written by otherwise competent software
engineers who are unfortunately blissfully unaware of the “tricks
of the trade”. Many will have done a course in cryptology, but most
likely only at the undergraduate level. There are a host of
cyber-security master’s degrees out there, but most don’t cover
the kind of stuff that a crypto programmer needs to know.
</p>
<p style="margin-bottom:0cm;line-height:100%"><br></p>
<p style="margin-bottom:0cm;line-height:100%">Mike Scott</p>
<p style="margin-bottom:0cm;line-height:100%"><br>
</p>
<p style="margin-bottom:0cm;line-height:100%"><br>
</p>
<p style="margin-bottom:0cm;line-height:100%"><br>
</p>
<p style="margin-bottom:0cm;line-height:100%"><br>
</p>
<p style="margin-bottom:0cm;line-height:100%"><br>
</p></div>