Главная
Study mode:
on
1
Intro
2
Recap
3
Station Flow
4
Biosets
5
PowerDVD
6
Secret Network
7
Mitigations
8
Lessons Learned
9
Questions
10
Nonsreuse
11
RNG failures
12
Aza appliances
13
Hardware appliances
14
Entropy sources
15
Deterministic engines
16
Key generation
17
Boot process
18
Timing
19
Conclusion
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore the critical realm of cybersecurity with a focus on side channels and backdoors in this comprehensive 1-hour lecture. Delve into topics such as station flow, biosets, power analysis, and secret networks while examining various mitigation strategies. Learn valuable lessons from real-world examples, including RNG failures and issues with hardware appliances. Investigate entropy sources, deterministic engines, key generation processes, and timing-based attacks. Gain essential insights to enhance your understanding of potential vulnerabilities and strengthen your approach to secure system design.

Side Channels and Backdoors in Cryptographic Systems

TheIACR
Add to list
0:00 / 0:00