YoVDO

By-Design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Cryptography Courses Encryption Algorithms Courses

Course Description

Overview

Explore the critical issue of mathematical backdoors in encryption algorithms in this 50-minute Black Hat conference talk. Delve into the concept of by-design backdoors placed directly within the mathematical structure of encryption systems. Understand how these backdoors differ from implementation-level vulnerabilities and why they pose a significant challenge to detect and exploit. Learn about the historical context, regulatory landscape, and international agreements surrounding cryptographic control. Examine case studies, including the Swiss company saga and the evolution of random number generators. Analyze specific algorithmic components like design transformations, linear partitions, and secret S-boxes. Discover techniques for last-round attacks and methods to detect potential tampering in existing ciphers. Gain insights into the implications of these findings for trusting foreign encryption algorithms and the future of cryptographic security.

Syllabus

Introduction
Agenda
Context
News
Regulation
International Agreement
Academic Approach
Trapdoor
Aim
Algorithm
Implementation
Bitty story
Swiss companies
Alice Billa
History of Random Number Generator
Federal Standards
Time Line
Statistics
NSA
Design Transformation
Linear Partition
Parameters
Primitive
Algorithms
Exploit
Last Round Attack
Secret SBox
Project Success
Conclusion
Future work
Analyzing existing ciphers
Detecting tampering


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network