YoVDO

Break Crypto like a Pro

Offered By: Security BSides San Francisco via YouTube

Tags

Security BSides Courses Cybersecurity Courses Cryptography Courses Block Ciphers Courses Hash Functions Courses Stream Ciphers Courses

Course Description

Overview

Explore common cryptographic vulnerabilities and exploitation techniques in this 42-minute conference talk from BSidesSF 2020. Delve into the challenges of implementing secure cryptography, examining real-world mistakes and their consequences. Learn about exclusive-or operations, randomness issues, and ransomware decryption. Discover the pitfalls of one-time pads, stream ciphers, and block ciphers. Investigate padding oracle attacks, bit flipping attacks, and authentication vulnerabilities. Gain practical insights through demonstrations and receive expert advice on improving cryptographic implementations. Conclude with a summary of key takeaways and resources for further learning in the field of cryptography security.

Syllabus

Introduction
Why Cryptography is Hard
General Recommendations
Mistakes
Exclusiveor
Randomness
Ransomware
Decrypter
Demo
Advice
Onetime Pad
XOR
Stream ciphers
Reusing keys
Block cipher
CBC mode
Padding
Parent Oracle
Oracle Attack
Bit flippant Attack
Bit flipping Attack
Authentication
Hash Functions
Summary
Further Learning


Taught by

Security BSides San Francisco

Related Courses

Криптографические методы защиты информации
National Research Nuclear University MEPhI via edX
Foundations of Cryptography
NPTEL via Swayam
Symmetric Cryptography Essential Training
LinkedIn Learning
Foundations of Cryptography
NPTEL via YouTube
Cryptography and Network Security
NPTEL via YouTube