Technologies
Concepts
Services
wolkenkit
Learning
Company
Cryptography
Concepts
Cryptography prevents third parties from reading private data and messages, and ensures their integrity.

Cryptography – protecting privacy

Cryptography is a subject of computer science that covers algorithms and methods to prevent third parties from reading private data and messages, and to ensure their integrity. Since the dawn of the web, cryptography has become a fundamental topic for anyone who builds and runs web or cloud applications. For us, cryptography as well as its algorithms and methods are an essential building block in anything we do.

Privacy

The primary task of cryptography is to protect privacy by encrypting data and messages. This is especially important in web and cloud applications, where users handle and share personal data at large scale.

Integrity

Protecting the privacy is as important as ensuring the integrity of data. You have to take care to either prevent or at least detect any tampering. This is crucial for any application someone relies on.

Authentication

Even if you know that the secrecy of data is protected and their integrity is ensured, you still need to authenticate the origin of the data. To be able to trust data, all three aspects must be fulfilled.

Consulting

How to consider cryptography when shaping new ideas? How to decide which cryptographic algorithms and methods to use? How to design the architecture of a secure web or cloud application? How to implement and use cryptographic algorithms? How to apply security to operations? These and similar questions arise frequently in every cryptography project. If you face these questions, too, we are there to help by sharing our experience and giving advise. Let's get in touch!

Shaping visions

When shaping a vision, cryptography must not be an afterthought. Instead, you need to take it into account from day one. We help our customers to treat security as a core feature of their ideas and projects.

Evaluating technologies

When using cryptography, you have to deal with a variety of algorithms that serve different purposes. We help our customers to evaluate algorithms and choose appropriate ones, according to their intentions.

Designing architectures

Designing a solid architecture is hard, especially when cryptography comes into play. We help to design APIs and services, so that they respect privacy, integrity, and authentication – with security built-in from day one.

Building applications

Implementing your own algorithms and security methods is one of the worst ideas in cryptography. We help our customers to get an overview of what's available, and to select and use what's appropriate.

Applying operations

Running applications requires you to use HTTPS, certificates, tokens, and other security concepts. We help to apply these building blocks, so that you get a secure infrastructure for operations.

Let's get in touch

We would like to get to know you, and to learn about your current situation. Together, we can figure out how to empower you, and find answers to your individual visions, ideas, and questions. Let's get in touch!
Want answers to your questions?Let's get in touch!

Workshops

Learn how to consider cryptography when shaping new ideas. Become an expert in deciding which cryptographic algorithms and methods to use. Learn how to design the architecture of secure web and cloud applications. Implement and use cryptographic algorithms. And finally, apply security to operations. You can learn all of this in our workshops, which of course are also available tailor-made, suitable to your individual needs – remote or on-site. Let's get in touch!

On demand – remote or on-site

You define place and time

An advanced introduction to cryptography

In English or German

Learn about the core concepts of cryptography, and how to apply algorithms and methods. In a small group you will experience the theoretical basics as well as the hands-on usage.

This workshop includes

  • Introducing cryptography
  • Encrypting and decrypting data
  • Calculating random numbers
  • Understanding symmetric and asymmetric encryption
  • Ensuring integrity
  • Using and verifying digital signatures
  • Securing the network
  • And much more…
Hannes Leutloff
Let's get in touch

On demand – remote or on-site

You define place and time

Designing secure web and cloud applications

In English or German

Learn how to use cryptography to design and build secure web and cloud applications. In a small group you will experience the theoretical basics as well as the hands-on usage.

This workshop includes

  • Using HTTPS and certificates
  • Identifying and authenticating users
  • Authorizing users, groups, and roles
  • Encrypting data storage
  • Understanding tokens and claims
  • Implementing single-sign on
  • Defending against attacks
  • And much more…
Golo Roden
Let's get in touch

On demand – remote or on-site

You define place and time

Your individual cryptography workshop

In English or German

Do you need an individual cryptography workshop? In close collaboration with you we setup a tailor-made agenda that addresses what's most important to your individual project requirements.

This workshop includes

  • Tailor-made agenda
  • Balanced mix of theory and hands-on
  • Your place, your time
  • Close collaboration with the speaker
  • Group size according to your wishes
  • Follow-up support from our experts
  • Everything according to your needs
  • And much more…
Sophie van Sky
Let's get in touch

Development

Regardless of the conceptual effort you have already put into a project, sometimes you just don't have the people with the required experience to move things forward. We at the native web do not only have many years of experience with cryptography, we also have extensive knowledge about the development and architecture of web and cloud applications in general. Whatever you are looking for, we will be the right development partner for you. Let's get in touch!

Secure web platforms

We develop secure applications, APIs, and services, that use industry-grade cryptographic standards, such as AES, RSA, SHA, and HMAC. They use claims-based identity management, single-sign on, and federation.

Secure storage

We develop secure storage solutions that empower you to securely transfer sensitive data using unsecure public connections. Managing secrets, and verifying integrity and authentication are core features.

Certificate management

We develop applications that let you run a custom certificate authority, in order to support your in-house public key infrastructure. They also feature managing, monitoring, and revoking certificates.
Have a project in mind?Let's get in touch!

Your journey to cryptography

We believe that having the chance to learn and to evolve every day is a valuable privilege that we are very thankful for. Having a deep desire for knowledge, we take hard problems as welcome challenges, not vice versa. Hence, we would like to empower you by sharing the following resources on cryptography.

Let's go

To get started with cryptography, first learn its core concepts by manually implementing an ancient algorithm. Read about symmetric encryption, and figure out how pseudo-random number generators work.

En route

Once you are familiar with the basic concepts, learn about using AES, and understand the differences between ECB, CBC, and GCM modes. Compare that to asymmetric techniques, such as Diffie-Hellman and RSA.

No limits

Learn how hash algorithms, message authentication codes, certificates, and HTTPS work. Get to know the Crypto 101 website and read about details you find interesting. Finally, discover Let's Encrypt and Vault.
Need help on your way?Let's get in touch!