YoVDO

Common Developer Crypto Mistakes with Illustrations in Java

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Java Courses Cryptography Courses Hash Functions Courses Key Management Courses Replay Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore common cryptographic mistakes made by developers through a comprehensive conference talk featuring Java illustrations. Delve into topics such as random number generation weaknesses, misuse of hash functions, inappropriate key management, and vulnerabilities in encryption methods. Learn about secure practices for message digests, frequency analysis, and chosen plaintext attacks. Gain insights into RSA encryption, TLS implementation, database encryption, and Java security providers. Discover practical tips to avoid common pitfalls and strengthen cryptographic implementations in your software development projects.

Syllabus

Intro
Common developer mistakes
Start your presentation
Dont wave
Good and bad news
Random number generators
Weaknesses in random number generation
SHA1 seed size
Pseudorandom
Message digests
Misusing hash
Lazy toad
Super brain room
Inappropriate weaknesses
Random keys
Inappropriate use of psychic notes
Logged Replay Attack
Skip town
Security cash
Frequency Analysis
Text Size
Not Be discernible
Trust me
Dont do this
Encryptthenmac
Citizen Sector
Encrypted Data
Chosen plaintext attacks
RSA encryption
PCI
TLS
Key Management
Database Encryption
Data Encryption
Security Providers
Scavenger Rider
Default
Insert
Watch
Java Security
Additional References
Crypto Attacks


Related Courses

Algorithms, Part I
Princeton University via Coursera
Introduction à la programmation orientée objet (en Java)
École Polytechnique Fédérale de Lausanne via Coursera
MongoDB for Java Developers
MongoDB University
Initiation à la programmation (en Java)
École Polytechnique Fédérale de Lausanne via Coursera
Intro to Java Programming
San Jose State University via Udacity