48 Dirty Little Secrets Cryptographers Don't Want You to Know
Offered By: Black Hat via YouTube
Course Description
Overview
Explore 48 cryptographic attacks in this Black Hat conference talk by Thomas Ptacek and Big Ol Al. Dive into a comprehensive overview of the Matasano crypto challenges, a learning exercise completed by over 10,000 participants. Gain early access to all challenges and understand their real-world implications in software security. Examine implementations in various programming languages, from X86 assembly to Haskell, through a "Rosetta Code" site. Follow step-by-step explanations of exploit code for select attacks, covering topics such as block cipher mode selection, public key agreement algorithms, RSA, Diffie-Hellman, stream ciphers, and more. Enhance your cryptographic knowledge with insights into key strength, curve generators, and the Chinese remainder theorem.
Syllabus
Intro
RSA
Saltstack
Motivation
Languages
Microsoft Excel
Postscript
CryptoCat
DiffieHellman
BigAnt
Key Strength
Babystep
Crypto Cat
Stream Ciphers
CTR Mode
Public Key Cryptography
Daniel Blackmarks
Padded RSA
DragonBox
Property of RSA
Math
Diffie Hellman
How Clock Works
Multiplication
Curves
Curve Generator
Chinese remainder theorem
Demo
Extended GCD
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube