YoVDO

Understanding and Managing Entropy Usage

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cryptography Courses Entropy Courses Hardware Security Courses TLS Courses Perfect Forward Secrecy Courses

Course Description

Overview

Explore the critical role of entropy in modern cryptography and IT systems in this 56-minute Black Hat conference talk. Delve into the importance of cryptographically strong random numbers for key generation and nonce inclusion. Examine the challenges of Pseudo Random Number Generators (PRNGs) and their reliance on entropy sources. Discover the impact of Perfect Forward Secrecy on entropy usage in TLS. Analyze entropy requirements and utilization across various systems, including Linux, FreeBSD, OpenSSL, OpenSSH, and OpenVPN. Learn about entropy consumption in different TLS modes and the quality of entropy sources in common hardware. Gain insights into the newly released open-source software, libentropy, which provides a unified interface for OpenSSL to manage entropy sources and report usage statistics. Explore topics such as NIST guidelines, entropy pools, entropy estimation, and quantum random number generators.

Syllabus

Introduction
Penn College of Technology
Research
The Game
Entropy vs Randomness
Random Number Generators
NIST Guidelines
Linux
Ivy Bridge
Lava Lamp
PRNG
Monitor Entropy
Entropy Pools
Entropy Statistics
Summary
Rand
OpenSSL
FreeBSD
ModSSL
Nginx
Entropy Estimation
Controlling Inputs
Entropy Client
Open SSL
The Holy War
Quantum RNG
Open Source
Headless Machine
Bruce Question
Bitcoin Hack
Test Suites


Taught by

Black Hat

Related Courses

Hardware Security
University of Maryland, College Park via Coursera
Information Security- II
Indian Institute of Technology Madras via Swayam
Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Cybersecurity
University of Maryland, College Park via Coursera
Learning Mobile Device Security
LinkedIn Learning