YoVDO

Building Robust Backdoors in Secret Symmetric Ciphers

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Cryptography Courses Block Ciphers Courses

Course Description

Overview

Explore the intricacies of embedding robust backdoors in secret symmetric ciphers in this 50-minute Black Hat USA 2005 conference talk by Adam L. Young. Delve into various types of backdoors, examining historical cases like the Anderson Report, Data Encryption Standard (DES), and Digital Signature Standard (DSS). Learn about approaches to casting doubt, backdoor implementation in public and secret block ciphers, and master key cryptosystems. The talk covers deterministic asymmetric encryption, introducing the Monkey Cipher and Black-Rugose Cipher, discussing their overview and security implications. Gain valuable insights into the complex world of cryptographic backdoors and their potential impact on secure communication systems.

Syllabus

Intro
Types of Backdoors
The Anderson Report
The Data Encryption Standard (DES)
The Digital Signature Standard (DSS)
Approaches to Casting Doubt
Backdoor in a Public Block Cipher
Backdoor in a Secret Block Cipher
Master key Cryptosystems
Roadmap for Talk
Deterministic Asymmetric Encryption
The Monkey Cipher
Monkey Overview
Monkey Security
The Black-Rugose Cipher
Black-Rugose Overview
Black-Rugose Security
Conclusion


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network