By-Design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms

By-Design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms

Black Hat via YouTube Direct link

Agenda

2 of 32

2 of 32

Agenda

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

By-Design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Agenda
  3. 3 Context
  4. 4 News
  5. 5 Regulation
  6. 6 International Agreement
  7. 7 Academic Approach
  8. 8 Trapdoor
  9. 9 Aim
  10. 10 Algorithm
  11. 11 Implementation
  12. 12 Bitty story
  13. 13 Swiss companies
  14. 14 Alice Billa
  15. 15 History of Random Number Generator
  16. 16 Federal Standards
  17. 17 Time Line
  18. 18 Statistics
  19. 19 NSA
  20. 20 Design Transformation
  21. 21 Linear Partition
  22. 22 Parameters
  23. 23 Primitive
  24. 24 Algorithms
  25. 25 Exploit
  26. 26 Last Round Attack
  27. 27 Secret SBox
  28. 28 Project Success
  29. 29 Conclusion
  30. 30 Future work
  31. 31 Analyzing existing ciphers
  32. 32 Detecting tampering

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.