YoVDO

How to Implement Crypto Poorly

Offered By: YouTube

Tags

Conference Talks Courses Cryptography Courses Statistical Analysis Courses Single-Sign-On Courses Secure Coding Practices Courses HMAC Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the common pitfalls and mistakes in implementing cryptography through this conference talk from GrrCon 2016. Delve into the world of custom single sign-on systems and their vulnerabilities, examining real-world examples of poor cryptographic implementations. Learn about length extension attacks, preimage attacks, and the importance of HMAC. Discover the prevalence of obsolete crypto primitives, short keys, and static initialization vectors in custom SSO solutions. Analyze the implications of these errors for application security and understand why rolling your own crypto is generally discouraged. Gain insights into proper cryptographic implementation techniques, explore resources for learning cryptography, and understand why cryptography poses unique challenges for developers.

Syllabus

Intro
Who am I?
Don't roll your own crypto!
What's single sign-on?
What's custom single sign-on?
I found this emergency fix
The Freshdesk Flaw
The Custom Single Sign-on Survey
Basic Stats
No HMAC: Length Extension Attacks
No HMAC: Preimage Attacks
HMAC: Explained
What percent actually used an HMAC?
Uses Obsolete Crypto Primitives
What percent used a best practice cipher? Best Practice Cipher
Short Keys
Java getBytes
Let's do the math
What percent made that silly error?
Replay Attacks
What percent kept their hash the same each time?
Static Initialization Vector
What percent used a static IV?
One implementation wrote their own cipher!
What went wrong?
Implications for the application
Should you roll your own crypto?
Overall Results
Vendor Response
Custom SSO: The Right Way
Dumb ideas for your crypto
Why did these companies make these mistakes?
Cryptography is different
Cryptography is awesome!
Resources for learning cryptography


Related Courses

Web Authentication With Golang - Google's Go Language
Udemy
Jupyter Hub - Teaching Crypto - Hashing
Bill Buchanan OBE via YouTube
API Abuse through Mobile Apps - New Attacks, New Defenses
RSA Conference via YouTube
Preventing Mobile App and API Abuse
OWASP Foundation via YouTube
Authentication as a Microservice - Portable Customer Identity Management
OWASP Foundation via YouTube