Главная
Study mode:
on
1
Intro
2
Why this talk • Cryptography: HARD
3
whoami • Past: software development
4
General recommendations
5
Common mistakes
6
Exclusive OR (XOR)
7
Randomness
8
One time pad (OTP)
9
One time? But why?
10
Stream cipher (more practical OTP)
11
Block cipher primitive
12
Electronic code block (ECB)
13
Cipher block chaining (CBC)
14
CBC decryption
15
Padding (for block ciphers)
16
What about integrity?
17
Bit flipping (stream cipher)
18
Bit flipping (block cipher, CBC mode)
19
Authenticated encryption
20
Hash vs KDF
21
Takeaways
22
Further learning
Description:
Explore common cryptographic mistakes and learn how to exploit them in this 54-minute conference talk. Dive into topics such as exclusive OR (XOR), randomness, one-time pads, stream ciphers, block ciphers, and various encryption modes. Understand the importance of proper padding, integrity checks, and authenticated encryption. Gain insights into the differences between hashing and key derivation functions. Walk away with practical knowledge on cryptographic vulnerabilities and recommendations for secure implementation.

Yes, You Too Can Break Crypto - Exploiting Common Crypto Mistakes

OWASP Foundation
Add to list