Главная
Study mode:
on
1
Introduction
2
Why Cryptography is Hard
3
General Recommendations
4
Mistakes
5
Exclusiveor
6
Randomness
7
Ransomware
8
Decrypter
9
Demo
10
Advice
11
Onetime Pad
12
XOR
13
Stream ciphers
14
Reusing keys
15
Block cipher
16
CBC mode
17
Padding
18
Parent Oracle
19
Oracle Attack
20
Bit flippant Attack
21
Bit flipping Attack
22
Authentication
23
Hash Functions
24
Summary
25
Further Learning
Description:
Explore common cryptographic vulnerabilities and exploitation techniques in this 42-minute conference talk from BSidesSF 2020. Delve into the challenges of implementing secure cryptography, examining real-world mistakes and their consequences. Learn about exclusive-or operations, randomness issues, and ransomware decryption. Discover the pitfalls of one-time pads, stream ciphers, and block ciphers. Investigate padding oracle attacks, bit flipping attacks, and authentication vulnerabilities. Gain practical insights through demonstrations and receive expert advice on improving cryptographic implementations. Conclude with a summary of key takeaways and resources for further learning in the field of cryptography security.

Break Crypto like a Pro

Security BSides San Francisco
Add to list
0:00 / 0:00