YoVDO

Cryptology - It's a Scalpel, Not a Hammer

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Key Exchange Courses Data Integrity Courses Public Key Cryptography Courses Security Vulnerabilities Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the fundamentals of cryptology in this 55-minute conference talk from BSides Columbus 2018. Delve into the history of classic ciphers, understand the Triangle of Security, and examine the four main adversarial capabilities. Learn about software bugs versus security vulnerabilities, the importance of randomness in encryption, and various encryption modes like CBC. Investigate concepts such as padding oracles, integrity, authentic encryption, and public key cryptography. Discover the significance of prime numbers, key exchange, and elliptical curve cryptography. Gain insights into password security, including the use of salt. Understand why cryptology should be viewed as a precise tool rather than a catch-all solution for cybersecurity challenges.

Syllabus

Introduction
Software bugs vs security vulnerabilities
Brief history
Classic ciphers
Prometheus tables
How it works
Triangle of Security
The four main adversarial capabilities
Why would we decrypt malicious cyberattacks
The system must not require secrecy
Long BS passage
Pepe
The Problem
Randomness
CBC Mode
Penguin
Oracle
Padding Oracle
Integrity
Fencegate
Authentic Encryption
Prime Numbers
Trust
Key Exchange
Untrusting
Public Key Cryptography
Passwords
Salt
Elliptical Curve


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube