Главная
Study mode:
on
1
Intro
2
Types of Backdoors
3
The Anderson Report
4
The Data Encryption Standard (DES)
5
The Digital Signature Standard (DSS)
6
Approaches to Casting Doubt
7
Backdoor in a Public Block Cipher
8
Backdoor in a Secret Block Cipher
9
Master key Cryptosystems
10
Roadmap for Talk
11
Deterministic Asymmetric Encryption
12
The Monkey Cipher
13
Monkey Overview
14
Monkey Security
15
The Black-Rugose Cipher
16
Black-Rugose Overview
17
Black-Rugose Security
18
Conclusion
Description:
Explore the intricacies of embedding robust backdoors in secret symmetric ciphers in this 50-minute Black Hat USA 2005 conference talk by Adam L. Young. Delve into various types of backdoors, examining historical cases like the Anderson Report, Data Encryption Standard (DES), and Digital Signature Standard (DSS). Learn about approaches to casting doubt, backdoor implementation in public and secret block ciphers, and master key cryptosystems. The talk covers deterministic asymmetric encryption, introducing the Monkey Cipher and Black-Rugose Cipher, discussing their overview and security implications. Gain valuable insights into the complex world of cryptographic backdoors and their potential impact on secure communication systems.

Building Robust Backdoors in Secret Symmetric Ciphers

Black Hat
Add to list