We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Appsec Village - Crypto Failures and how to avoid them

00:00

Formal Metadata

Title
Appsec Village - Crypto Failures and how to avoid them
Title of Series
Number of Parts
335
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Crypto used to mean cryptography - and in the realm of mathematics. Nowadays, everyone wants some crypto for their security schemes. But sometimes people forget is that crypto is hard - and trusting your own crypto is very risky if you don't actually have cryptographers in your team! In this talk, we will review some common crypto failures and how they led to some of the biggest issues we've seen in recent years and conclude with some concrete advice on how to avoid such mistakes, and more importantly where to get advice.
Cryptography
Hacker (term)
MathematicsView (database)Execution unitData integrityPermianMereology
Function (mathematics)CryptographyHash functionoutputHydraulic jump
outputFunction (mathematics)Symmetric matrixCryptographyEncryption
CryptographyMessage passingEncryptionPublic-key cryptographyDecimalProof theoryIdentity managementEquivalence relationHash functionElectronic signatureRandom numberNumber
Insertion lossKey (cryptography)DatabaseCollisionDatabase transactionInterior (topology)CurveCryptographyAddress spaceEllipseDean number
Random numberEllipseMessage passingElectronic program guideHash functionCryptographyDatabase transactionCurveSign (mathematics)
Random numberDatabase transactionDecision tree learningProgrammable read-only memory
Client (computing)Database transactionSign (mathematics)Thread (computing)Address spaceSheaf (mathematics)InformationReading (process)
PermianRandom numberOpen setCAN busCode
Hash functionChainInstallable File SystemGrand Unified Theory
Reading (process)CodeView (database)CAN busRandom numberNumber
Database transactionElectric dipole momentTerm (mathematics)IRIS-T
CryptographyPasswordLinker (computing)MiniDiscFinite element methodData buffer
WritingCryptographyTerm (mathematics)
View (database)CryptographyHookingSequenceNumberFinite element methodInterior (topology)Message passing
View (database)Cryptography