YoVDO

How to Defend from an Attacker Armed with a Mathematician

Offered By: Devoxx via YouTube

Tags

Devoxx Courses Cybersecurity Courses Cryptography Courses Network Security Courses Public Key Cryptography Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of Diffie-Hellman key exchange and its vulnerabilities in this 21-minute Devoxx conference talk. Delve into the fundamental role of this public-key cryptographic method in Internet security protocols like IPsec, SSH, and TLS. Discover how maliciously generated group parameters can compromise the security of Diffie-Hellman implementations, as exemplified by the CVE-2016-0701 vulnerability in OpenSSL. Examine the controversial RFC 5114 and its impact on OpenSSL's susceptibility to Key Recovery Attacks. Learn about public key cryptography, discrete log functions, and the importance of safe primes in cryptographic implementations. Gain insights into HTTPS functionality, OpenSSL vulnerabilities, and validation techniques to enhance your understanding of cryptographic defense mechanisms.

Syllabus

Intro
About me
What is TLS
How does TLS work
What are the actors looking into
Dont get dependent
What we need to know
Public key cryptography
Discrete log function
Analogic logarithm
How HTTPS works
Openssl vulnerability
Openssl mistakes
Openssl validation
Safe primes
I look weird
I can screw this
F35114
HP5114
Question


Taught by

Devoxx

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera