On August 29, 2024, the Benelux LMAG visited Radboud University in Nijmegen, The Netherlands. The meeting was hosted by top cryptography expert, Prof. Joan Daemen, who is noted for developing the Rijndael cryptographic algorithm with his Ph.D. student and friend Vincent Rijmen more than two decades ago. 

Prof. Daemen introduced the group to the basics, the methods, considerations and possibilities of cryptographic methods. He explained stream cyphers, block cyphers and digital signatures, the importance of diffusion and confusion in algorithm design. He then elaborated in detail on the design rationale and important aspects of the Advanced Encryption Standard (AES). 

He also provided a little history. In November 2001, after a competitive, publicly open selection process, the American National Institute of Standards and Technology (NIST) selected this algorithm as the new Advanced Encryption Standard (AES) to replace the compromised and obsolete Digital Encryption Standard (DES).  AES is now the world wide standard in encryption. Most processors currently include dedicated instructions for executing AES. Applications include software, operating system login, safe VoIP communications, hard disk storage, safe internet communications, smart cards, etc.

Later in 2015, the Keccak secure hash function that was developed by Prof. Daemen and his team was selected by NIST as the new SHA-3 (Secure Hash Algorithm 3).  SHA-3 is used for digital signatures and for authentication of data.

Next, Bas Dunnebier, the Chief Technology Officer for the Dutch General Intelligence and Security Service, presented the importance of practical Cybersecurity. Under the current geopolitical tensions, risk for government and industrial espionage, hacking of and attacks on computer and communication infrastructures, security services are alert to a wide array of attacks and can employ all kinds of methods unavailable to regular citizens. 

Prof. Güneş Acar of Radboud University then presented the methods and current risks of the online tracking eco-system, which monitors user activities across websites, mobile apps, location data, connected devices, home appliances, cameras and TVs. Life demonstrations made it all very practical.

Afterwards lab tours were organized in groups of 10 participants, illustrating ongoing research work.

Benelux LMAG