YoVDO

The Factoring Dead - Preparing for the Cryptopocalypse

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Linear Algebra Courses Cryptography Courses Discrete Mathematics Courses RSA Conference Courses Algorithmic Complexity Courses Public Key Cryptography Courses Asymmetric Cryptography Courses Elliptic Curve Cryptography Courses

Course Description

Overview

Explore the potential cryptographic vulnerabilities and prepare for a post-RSA world in this Black Hat USA 2013 conference talk. Delve into the latest breakthroughs in discrete mathematics and their implications for popular cryptosystems, focusing on RSA and large number factoring. Learn about recent attacks on cryptographic weaknesses, such as BEAST, CRIME, and Lucky 13. Understand the disconnect between academic research and practical exploitation. Examine asymmetric cryptography, elliptic curve cryptography, and the discrete logarithm problem. Discover the current state of discrete logarithm algorithms and their progress. Investigate the potential failure of trust in cryptographic systems and the importance of perfect forward secrecy. Evaluate the security of ECC and other trapdoor functions. Assess the crypto ecosystem, including DNSSEC, OpenVPN, browsers, and certificates. Gain insights into surveying your exposure and preparing for potential cryptographic vulnerabilities in various software and products.

Syllabus

Intro
Why are we here
New attacks
MD5 attacks
Why do we have this disconnect
Why are we expensive
Math section
Asymmetric cryptography
What is asymmetric cryptography
What iselliptic curve cryptography
DiffieHellman key exchange
Discrete logarithm problem
The Mathematical Problem
Elliptic Curve Cryptography
Discrete logarithm
NIST recommended key sizes
Next section
Discrete logarithm algorithms
Algorithmic complexity
Discrete logarithm research
Discrete logarithm algorithm
Discrete logarithm progress
Antwon Joes algorithm
Current implications
Linear Algebra
RSA Public Keys
Factoring RSA Public Keys
Factoring Discrete Logs
Sneakers
Perfect Forward Sec
Failure of Trust
Make a Move
The ECC is Secure
Other Trapdoor Functions
Why arent we using ECC
Whats Sweetpea
Sweetpea
We didnt listen
RIM
Blackberry
Patent trolling
ECC support
Android ECC support
External libraries
TLS
Crypto Ecosystem
DNSSEC
OpenVPN
Browsers
Other software
Certificates
Global License
Use ECC
Survey your exposure
Summary


Taught by

Black Hat

Related Courses

Asymmetric Cryptography and Key Management
University of Colorado System via Coursera
Discrete Mathematics
City College of San Francisco via California Community Colleges System
Precalculus & Trigonometry
City College of San Francisco via California Community Colleges System
Discrete Structures
Chaffey College via California Community Colleges System
Discrete Math
Codecademy