Differential Cryptanalysis for Dummies - Layerone 2013
This talk is an introduction to finding and exploiting vulnerabilities in block ciphers using FEAL-4 as a case study. Attendees will learn how cryptanalysis can be used to break ciphers by finding the key with less computational effort than exhaustive search. After an introduction to block cipher components and structure, we will study the incredibly broken FEAL-4 algorithm. By exploiting statistical biases in the cipher, attendees will learn how to build a differential attack and ultimately recover the key.
Attendees should have a basic understanding of binary operations like XOR and a general familiarity with bits and bytes. Jon will guide attendees through the fundamentals of modern cryptanalysis while keeping the math to a minimum. That said, this talk is focused on the nitty gritty details of cipher vulnerabilities and how differential cryptanalysis can be applied to them.
Jon is also able to provide overviews of other cryptanalytic attacks (linear, boomerang, impossible differential, slide, etc..) if time permits and there is interest.
About the speaker:
Jon King is an active-duty member of the US Navy that enjoys breaking security as a hobby. He primarily focuses on finding vulnerabilities in high-security locks and tamper-evident devices. Additionally, Jon studies cryptanalysis with a focus on implementing realistic attacks against modern block ciphers. Despite having very little math background, he has digested the writings of the academic cryptography world and is available to translate their esoteric math-talk.
Видео Differential Cryptanalysis for Dummies - Layerone 2013 канала blak angel
Attendees should have a basic understanding of binary operations like XOR and a general familiarity with bits and bytes. Jon will guide attendees through the fundamentals of modern cryptanalysis while keeping the math to a minimum. That said, this talk is focused on the nitty gritty details of cipher vulnerabilities and how differential cryptanalysis can be applied to them.
Jon is also able to provide overviews of other cryptanalytic attacks (linear, boomerang, impossible differential, slide, etc..) if time permits and there is interest.
About the speaker:
Jon King is an active-duty member of the US Navy that enjoys breaking security as a hobby. He primarily focuses on finding vulnerabilities in high-security locks and tamper-evident devices. Additionally, Jon studies cryptanalysis with a focus on implementing realistic attacks against modern block ciphers. Despite having very little math background, he has digested the writings of the academic cryptography world and is available to translate their esoteric math-talk.
Видео Differential Cryptanalysis for Dummies - Layerone 2013 канала blak angel
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Cryptanalysis - L6 Differential Cryptanalysis](https://i.ytimg.com/vi/GQX8W8zKf2Q/default.jpg)
![Cryptography: The Science of Making and Breaking Codes](https://i.ytimg.com/vi/-yFZGF8FHSg/default.jpg)
![Differential Cryptanalysis](https://i.ytimg.com/vi/ONhPfIABxFs/default.jpg)
![Differential Cryptanalysis](https://i.ytimg.com/vi/xcBqraHhcJU/default.jpg)
![Cryptanalysis of Vigenere cipher: not just how, but why it works](https://i.ytimg.com/vi/QgHnr8-h0xI/default.jpg)
![Cryptanalysis](https://i.ytimg.com/vi/Kejs-saINOo/default.jpg)
![Applied Cryptology 5.2: Differential Cryptanalysis](https://i.ytimg.com/vi/Vd9GAg6YpDs/default.jpg)
![Construction Technology Quarterly, Q4 2020 Presentation](https://i.ytimg.com/vi/SZczq-ny_HE/default.jpg)
![Linear Cryptanalysis](https://i.ytimg.com/vi/93PD9CqcZTg/default.jpg)
![Hardware Reverse Engineering 101 - Layerone 2013](https://i.ytimg.com/vi/eYN4rHUfISg/default.jpg)
![Elliptic Curve Cryptography Overview](https://i.ytimg.com/vi/dCvB-mhkT0w/default.jpg)
![The Dark Arts of OSINT - Layerone 2013](https://i.ytimg.com/vi/WYuduexeZxI/default.jpg)
![The Woman Who Shattered Codes And Gender Barriers- Elizebeth Friedman](https://i.ytimg.com/vi/-7c2tDpzEXs/default.jpg)
![Math 4175 Day 23: Linear Cryptanalysis](https://i.ytimg.com/vi/1BU_fG8j51w/default.jpg)
![Double DES and Meet in the Middle Attack](https://i.ytimg.com/vi/FDgx055JA_Y/default.jpg)
![Cryptanalysis of Classical Ciphers](https://i.ytimg.com/vi/x2ojdYS5FF8/default.jpg)
![Lecture 5: Data Encryption Standard (DES): Encryption by Christof Paar](https://i.ytimg.com/vi/kPBJIhpcZgE/default.jpg)
![Cipher Block Chaining (CBC) | Algorithm Modes in Cryptography](https://i.ytimg.com/vi/NnLLkmgBhCY/default.jpg)
![Linear Cryptanalysis](https://i.ytimg.com/vi/r6o0_-OUNNU/default.jpg)
![Symmetric Key Cryptography: The XOR Cipher](https://i.ytimg.com/vi/pvII6_O6KAc/default.jpg)