Contributor Analysis
Offered By: Recon Conference via YouTube
Course Description
Overview
Discover a simple yet powerful cryptanalysis technique in this 25-minute conference talk from Recon Conference. Learn about contributor analysis, a method for detecting and attacking flawed cryptographic algorithms and implementations. Explore the theoretical principles behind this technique and its relationship to algebraic cryptanalysis. Gain insights into handling contributor lists with common operations and understand how these lists can be used to mount attacks, proving the vulnerability of affected ciphers. Examine real-world examples of ciphers susceptible to this analysis method. No prior mathematical or cryptographical knowledge is required, though some programming or computer architecture background is recommended for a fuller understanding.
Syllabus
Contributor analysis by Francisco Blas Izquierdo Riera (Klondike)
Taught by
Recon Conference
Related Courses
Internetwork SecurityIndian Institute of Technology, Kharagpur via Swayam Classical Cryptosystems and Core Concepts
University of Colorado System via Coursera Cryptography and Information Theory
University of Colorado System via Coursera Cryptography And Network Security
Indian Institute of Technology, Kharagpur via Swayam An Introduction to Cryptography
Coventry University via FutureLearn