YoVDO

Building Robust Backdoors in Secret Symmetric Ciphers

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Cryptography Courses Block Ciphers Courses

Course Description

Overview

Explore the intricacies of embedding robust backdoors in secret symmetric ciphers in this 50-minute Black Hat USA 2005 conference talk by Adam L. Young. Delve into various types of backdoors, examining historical cases like the Anderson Report, Data Encryption Standard (DES), and Digital Signature Standard (DSS). Learn about approaches to casting doubt, backdoor implementation in public and secret block ciphers, and master key cryptosystems. The talk covers deterministic asymmetric encryption, introducing the Monkey Cipher and Black-Rugose Cipher, discussing their overview and security implications. Gain valuable insights into the complex world of cryptographic backdoors and their potential impact on secure communication systems.

Syllabus

Intro
Types of Backdoors
The Anderson Report
The Data Encryption Standard (DES)
The Digital Signature Standard (DSS)
Approaches to Casting Doubt
Backdoor in a Public Block Cipher
Backdoor in a Secret Block Cipher
Master key Cryptosystems
Roadmap for Talk
Deterministic Asymmetric Encryption
The Monkey Cipher
Monkey Overview
Monkey Security
The Black-Rugose Cipher
Black-Rugose Overview
Black-Rugose Security
Conclusion


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube