Side Channels and Backdoors in Cryptographic Systems
Offered By: TheIACR via YouTube
Course Description
Overview
Explore the critical realm of cybersecurity with a focus on side channels and backdoors in this comprehensive 1-hour lecture. Delve into topics such as station flow, biosets, power analysis, and secret networks while examining various mitigation strategies. Learn valuable lessons from real-world examples, including RNG failures and issues with hardware appliances. Investigate entropy sources, deterministic engines, key generation processes, and timing-based attacks. Gain essential insights to enhance your understanding of potential vulnerabilities and strengthen your approach to secure system design.
Syllabus
Intro
Recap
Station Flow
Biosets
PowerDVD
Secret Network
Mitigations
Lessons Learned
Questions
Nonsreuse
RNG failures
Aza appliances
Hardware appliances
Entropy sources
Deterministic engines
Key generation
Boot process
Timing
Conclusion
Taught by
TheIACR
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network