Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic Code

USENIX via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore findings from an interview study with 21 experienced software developers about their practices, experiences, and challenges when updating cryptographic code. Learn about the critical importance of keeping cryptographic implementations current, including algorithm updates (SHA-1 to SHA-512), key size increases (2048 to 4096 bits), protocol transitions (TLS 1.2 to 1.3), and preparations for post-quantum cryptography. Discover why developers perceive cryptographic updates as challenging and tedious, examining their lack of structured processes and the significant obstacles they face, including insufficient cryptographic knowledge, legacy system constraints that hinder transitions, and inadequate guidance resources. Understand both security-driven and non-security motivations behind cryptographic updates, while gaining insights into developers' desires for expert assistance and accessible educational materials. Review comprehensive recommendations for multiple stakeholders including developers, academic institutions, standards organizations, and those preparing for the upcoming post-quantum cryptography transition, based on 30 years of collective industry experience from study participants.

Syllabus

USENIX Security '25 - "That's my perspective from 30 years of doing this": An Interview Study on...

Taught by

USENIX

Reviews

Start your review of An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic Code

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.