Главная
Study mode:
on
1
Introduction
2
Software bugs vs security vulnerabilities
3
Brief history
4
Classic ciphers
5
Prometheus tables
6
How it works
7
Triangle of Security
8
The four main adversarial capabilities
9
Why would we decrypt malicious cyberattacks
10
The system must not require secrecy
11
Long BS passage
12
Pepe
13
The Problem
14
Randomness
15
CBC Mode
16
Penguin
17
Oracle
18
Padding Oracle
19
Integrity
20
Fencegate
21
Authentic Encryption
22
Prime Numbers
23
Trust
24
Key Exchange
25
Untrusting
26
Public Key Cryptography
27
Passwords
28
Salt
29
Elliptical Curve
Description:
Explore the fundamentals of cryptology in this 55-minute conference talk from BSides Columbus 2018. Delve into the history of classic ciphers, understand the Triangle of Security, and examine the four main adversarial capabilities. Learn about software bugs versus security vulnerabilities, the importance of randomness in encryption, and various encryption modes like CBC. Investigate concepts such as padding oracles, integrity, authentic encryption, and public key cryptography. Discover the significance of prime numbers, key exchange, and elliptical curve cryptography. Gain insights into password security, including the use of salt. Understand why cryptology should be viewed as a precise tool rather than a catch-all solution for cybersecurity challenges.

Cryptology - It's a Scalpel, Not a Hammer

Add to list