Building Robust Backdoors in Secret Symmetric Ciphers
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the intricacies of embedding robust backdoors in secret symmetric ciphers in this 50-minute Black Hat USA 2005 conference talk by Adam L. Young. Delve into various types of backdoors, examining historical cases like the Anderson Report, Data Encryption Standard (DES), and Digital Signature Standard (DSS). Learn about approaches to casting doubt, backdoor implementation in public and secret block ciphers, and master key cryptosystems. The talk covers deterministic asymmetric encryption, introducing the Monkey Cipher and Black-Rugose Cipher, discussing their overview and security implications. Gain valuable insights into the complex world of cryptographic backdoors and their potential impact on secure communication systems.
Syllabus
Intro
Types of Backdoors
The Anderson Report
The Data Encryption Standard (DES)
The Digital Signature Standard (DSS)
Approaches to Casting Doubt
Backdoor in a Public Block Cipher
Backdoor in a Secret Block Cipher
Master key Cryptosystems
Roadmap for Talk
Deterministic Asymmetric Encryption
The Monkey Cipher
Monkey Overview
Monkey Security
The Black-Rugose Cipher
Black-Rugose Overview
Black-Rugose Security
Conclusion
Taught by
Black Hat
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera