YoVDO

Malicious Cryptography: Beyond Adhering to Specifications in Secure Systems - ICBS 2024

Offered By: BIMSA via YouTube

Tags

Cryptography Courses Ransomware Courses Complexity Theory Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of "Malicious Cryptography" in this comprehensive lecture by Moti Yung at ICBS2024. Delve into how cryptographic systems can be redirected and repurposed beyond their initial specifications, sometimes contradicting their intended use. Examine case studies including the breaking of fielded Escrow Encryptions and the prediction of Ransomware with its countermeasures. Investigate systematic treatments of repurposed cryptographic systems, covering topics such as Kleptography, Post Snowden Cryptography, and Anamorphic Encryption. Gain insights into the challenges of careless cryptography use and design, as well as the limitations imposed by adversarial bodies in the "Crypto Wars". Learn how these concepts have evolved over the past three decades and their implications for modern cryptographic systems.

Syllabus

Moti Yung: Malicious Cryptography: beyond adhering to specifications in secure systems #ICBS2024


Taught by

BIMSA

Related Courses

Cyber Security Foundations: Common Malware Attacks and Defense Strategies
EC-Council via FutureLearn
Cybersecurity Foundations
LinkedIn Learning
The Cybersecurity Threat Landscape
LinkedIn Learning
A Guide to Ransomware Protection
Udemy
Ciberseguridad. Bases y estructuras para la protección de la información
Universidad Anáhuac via edX