YoVDO

Building Robust Backdoors in Secret Symmetric Ciphers

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Cryptography Courses Block Ciphers Courses

Course Description

Overview

Explore the intricacies of embedding robust backdoors in secret symmetric ciphers in this 50-minute Black Hat USA 2005 conference talk by Adam L. Young. Delve into various types of backdoors, examining historical cases like the Anderson Report, Data Encryption Standard (DES), and Digital Signature Standard (DSS). Learn about approaches to casting doubt, backdoor implementation in public and secret block ciphers, and master key cryptosystems. The talk covers deterministic asymmetric encryption, introducing the Monkey Cipher and Black-Rugose Cipher, discussing their overview and security implications. Gain valuable insights into the complex world of cryptographic backdoors and their potential impact on secure communication systems.

Syllabus

Intro
Types of Backdoors
The Anderson Report
The Data Encryption Standard (DES)
The Digital Signature Standard (DSS)
Approaches to Casting Doubt
Backdoor in a Public Block Cipher
Backdoor in a Secret Block Cipher
Master key Cryptosystems
Roadmap for Talk
Deterministic Asymmetric Encryption
The Monkey Cipher
Monkey Overview
Monkey Security
The Black-Rugose Cipher
Black-Rugose Overview
Black-Rugose Security
Conclusion


Taught by

Black Hat

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera