48 Dirty Little Secrets Cryptographers Don't Want You to Know
Offered By: Black Hat via YouTube
Course Description
Overview
Explore 48 cryptographic attacks in this Black Hat conference talk by Thomas Ptacek and Big Ol Al. Dive into a comprehensive overview of the Matasano crypto challenges, a learning exercise completed by over 10,000 participants. Gain early access to all challenges and understand their real-world implications in software security. Examine implementations in various programming languages, from X86 assembly to Haskell, through a "Rosetta Code" site. Follow step-by-step explanations of exploit code for select attacks, covering topics such as block cipher mode selection, public key agreement algorithms, RSA, Diffie-Hellman, stream ciphers, and more. Enhance your cryptographic knowledge with insights into key strength, curve generators, and the Chinese remainder theorem.
Syllabus
Intro
RSA
Saltstack
Motivation
Languages
Microsoft Excel
Postscript
CryptoCat
DiffieHellman
BigAnt
Key Strength
Babystep
Crypto Cat
Stream Ciphers
CTR Mode
Public Key Cryptography
Daniel Blackmarks
Padded RSA
DragonBox
Property of RSA
Math
Diffie Hellman
How Clock Works
Multiplication
Curves
Curve Generator
Chinese remainder theorem
Demo
Extended GCD
Taught by
Black Hat
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera