YoVDO

Break Crypto like a Pro

Offered By: Security BSides San Francisco via YouTube

Tags

Security BSides Courses Cybersecurity Courses Cryptography Courses Block Ciphers Courses Hash Functions Courses Stream Ciphers Courses

Course Description

Overview

Explore common cryptographic vulnerabilities and exploitation techniques in this 42-minute conference talk from BSidesSF 2020. Delve into the challenges of implementing secure cryptography, examining real-world mistakes and their consequences. Learn about exclusive-or operations, randomness issues, and ransomware decryption. Discover the pitfalls of one-time pads, stream ciphers, and block ciphers. Investigate padding oracle attacks, bit flipping attacks, and authentication vulnerabilities. Gain practical insights through demonstrations and receive expert advice on improving cryptographic implementations. Conclude with a summary of key takeaways and resources for further learning in the field of cryptography security.

Syllabus

Introduction
Why Cryptography is Hard
General Recommendations
Mistakes
Exclusiveor
Randomness
Ransomware
Decrypter
Demo
Advice
Onetime Pad
XOR
Stream ciphers
Reusing keys
Block cipher
CBC mode
Padding
Parent Oracle
Oracle Attack
Bit flippant Attack
Bit flipping Attack
Authentication
Hash Functions
Summary
Further Learning


Taught by

Security BSides San Francisco

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera