YoVDO

Cryptology - It's a Scalpel, Not a Hammer

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Key Exchange Courses Data Integrity Courses Public Key Cryptography Courses Security Vulnerabilities Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the fundamentals of cryptology in this 55-minute conference talk from BSides Columbus 2018. Delve into the history of classic ciphers, understand the Triangle of Security, and examine the four main adversarial capabilities. Learn about software bugs versus security vulnerabilities, the importance of randomness in encryption, and various encryption modes like CBC. Investigate concepts such as padding oracles, integrity, authentic encryption, and public key cryptography. Discover the significance of prime numbers, key exchange, and elliptical curve cryptography. Gain insights into password security, including the use of salt. Understand why cryptology should be viewed as a precise tool rather than a catch-all solution for cybersecurity challenges.

Syllabus

Introduction
Software bugs vs security vulnerabilities
Brief history
Classic ciphers
Prometheus tables
How it works
Triangle of Security
The four main adversarial capabilities
Why would we decrypt malicious cyberattacks
The system must not require secrecy
Long BS passage
Pepe
The Problem
Randomness
CBC Mode
Penguin
Oracle
Padding Oracle
Integrity
Fencegate
Authentic Encryption
Prime Numbers
Trust
Key Exchange
Untrusting
Public Key Cryptography
Passwords
Salt
Elliptical Curve


Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera