Главная
Study mode:
on
1
Intro
2
Why are we here
3
New attacks
4
MD5 attacks
5
Why do we have this disconnect
6
Why are we expensive
7
Math section
8
Asymmetric cryptography
9
What is asymmetric cryptography
10
What iselliptic curve cryptography
11
DiffieHellman key exchange
12
Discrete logarithm problem
13
The Mathematical Problem
14
Elliptic Curve Cryptography
15
Discrete logarithm
16
NIST recommended key sizes
17
Next section
18
Discrete logarithm algorithms
19
Algorithmic complexity
20
Discrete logarithm research
21
Discrete logarithm algorithm
22
Discrete logarithm progress
23
Antwon Joes algorithm
24
Current implications
25
Linear Algebra
26
RSA Public Keys
27
Factoring RSA Public Keys
28
Factoring Discrete Logs
29
Sneakers
30
Perfect Forward Sec
31
Failure of Trust
32
Make a Move
33
The ECC is Secure
34
Other Trapdoor Functions
35
Why arent we using ECC
36
Whats Sweetpea
37
Sweetpea
38
We didnt listen
39
RIM
40
Blackberry
41
Patent trolling
42
ECC support
43
Android ECC support
44
External libraries
45
TLS
46
Crypto Ecosystem
47
DNSSEC
48
OpenVPN
49
Browsers
50
Other software
51
Certificates
52
Global License
53
Use ECC
54
Survey your exposure
55
Summary
Description:
Explore the potential cryptographic vulnerabilities and prepare for a post-RSA world in this Black Hat USA 2013 conference talk. Delve into the latest breakthroughs in discrete mathematics and their implications for popular cryptosystems, focusing on RSA and large number factoring. Learn about recent attacks on cryptographic weaknesses, such as BEAST, CRIME, and Lucky 13. Understand the disconnect between academic research and practical exploitation. Examine asymmetric cryptography, elliptic curve cryptography, and the discrete logarithm problem. Discover the current state of discrete logarithm algorithms and their progress. Investigate the potential failure of trust in cryptographic systems and the importance of perfect forward secrecy. Evaluate the security of ECC and other trapdoor functions. Assess the crypto ecosystem, including DNSSEC, OpenVPN, browsers, and certificates. Gain insights into surveying your exposure and preparing for potential cryptographic vulnerabilities in various software and products. Read more

The Factoring Dead - Preparing for the Cryptopocalypse

Black Hat
Add to list
0:00 / 0:00