YoVDO

Contributor Analysis

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Programming Courses Cybersecurity Courses Computer Architecture Courses Cryptanalysis Courses Cryptographic Algorithms Courses

Course Description

Overview

Discover a simple yet powerful cryptanalysis technique in this 25-minute conference talk from Recon Conference. Learn about contributor analysis, a method for detecting and attacking flawed cryptographic algorithms and implementations. Explore the theoretical principles behind this technique and its relationship to algebraic cryptanalysis. Gain insights into handling contributor lists with common operations and understand how these lists can be used to mount attacks, proving the vulnerability of affected ciphers. Examine real-world examples of ciphers susceptible to this analysis method. No prior mathematical or cryptographical knowledge is required, though some programming or computer architecture background is recommended for a fuller understanding.

Syllabus

Contributor analysis by Francisco Blas Izquierdo Riera (Klondike)


Taught by

Recon Conference

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network