Malicious Cryptography: Beyond Adhering to Specifications in Secure Systems - ICBS 2024
Offered By: BIMSA via YouTube
Course Description
Overview
Explore the concept of "Malicious Cryptography" in this comprehensive lecture by Moti Yung at ICBS2024. Delve into how cryptographic systems can be redirected and repurposed beyond their initial specifications, sometimes contradicting their intended use. Examine case studies including the breaking of fielded Escrow Encryptions and the prediction of Ransomware with its countermeasures. Investigate systematic treatments of repurposed cryptographic systems, covering topics such as Kleptography, Post Snowden Cryptography, and Anamorphic Encryption. Gain insights into the challenges of careless cryptography use and design, as well as the limitations imposed by adversarial bodies in the "Crypto Wars". Learn how these concepts have evolved over the past three decades and their implications for modern cryptographic systems.
Syllabus
Moti Yung: Malicious Cryptography: beyond adhering to specifications in secure systems #ICBS2024
Taught by
BIMSA
Related Courses
Cyber Security Foundations: Common Malware Attacks and Defense StrategiesEC-Council via FutureLearn Cybersecurity Foundations
LinkedIn Learning The Cybersecurity Threat Landscape
LinkedIn Learning A Guide to Ransomware Protection
Udemy Ciberseguridad. Bases y estructuras para la protección de la información
Universidad Anáhuac via edX