Главная
Study mode:
on
1
Introduction
2
Agenda
3
Context
4
News
5
Regulation
6
International Agreement
7
Academic Approach
8
Trapdoor
9
Aim
10
Algorithm
11
Implementation
12
Bitty story
13
Swiss companies
14
Alice Billa
15
History of Random Number Generator
16
Federal Standards
17
Time Line
18
Statistics
19
NSA
20
Design Transformation
21
Linear Partition
22
Parameters
23
Primitive
24
Algorithms
25
Exploit
26
Last Round Attack
27
Secret SBox
28
Project Success
29
Conclusion
30
Future work
31
Analyzing existing ciphers
32
Detecting tampering
Description:
Explore the critical issue of mathematical backdoors in encryption algorithms in this 50-minute Black Hat conference talk. Delve into the concept of by-design backdoors placed directly within the mathematical structure of encryption systems. Understand how these backdoors differ from implementation-level vulnerabilities and why they pose a significant challenge to detect and exploit. Learn about the historical context, regulatory landscape, and international agreements surrounding cryptographic control. Examine case studies, including the Swiss company saga and the evolution of random number generators. Analyze specific algorithmic components like design transformations, linear partitions, and secret S-boxes. Discover techniques for last-round attacks and methods to detect potential tampering in existing ciphers. Gain insights into the implications of these findings for trusting foreign encryption algorithms and the future of cryptographic security.

By-Design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms

Black Hat
Add to list
0:00 / 0:00