What is: Cryptographically Secure Pseudo Random Number Generator (CSPRNG) ?
6
Dos and Donts Source of Entropy
7
Authenticated Encryption (AE)
8
Authenticated Encryption with Associated Data (AEAD)
9
Dos & Donts
10
Padding Schemes across implementations
11
What is a Hash Functions
12
Hash: Properties/Strength
13
What is a Message Authentication Code(MAC) ?
14
Storing Secrets - Dos and Donts
15
Public Key Cryptography using ECC
Description:
Explore cryptographic best practices and common pitfalls in this 32-minute conference talk from NorthSec 2021. Gain insights into real-world crypto attacks, learn how to navigate modern cryptography APIs, and understand the latest developments in cryptographic communities. Delve into various cryptographic primitives, including Random Number Generators, Encryption/Decryption algorithms, message authentication codes, digital signatures, and password storage. Discover secure patterns and practices for designing and analyzing cryptographic systems, with a focus on future-proofing applications. Benefit from the expertise of Mansi Sheth, Principal Security Researcher at Veracode Inc., as she shares valuable knowledge for security architects, developers, and practitioners involved in cryptographic application design and auditing.