Hunting Invisible Salamanders - Cryptographic Insecurity with Attacker-Controlled Keys

Hunting Invisible Salamanders - Cryptographic Insecurity with Attacker-Controlled Keys

Black Hat via YouTube Direct link

From Two Keys to Many A

14 of 21

14 of 21

From Two Keys to Many A

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hunting Invisible Salamanders - Cryptographic Insecurity with Attacker-Controlled Keys

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 This Talk
  3. 3 Authenticated Encryption
  4. 4 New Settings, New Needs
  5. 5 Overview
  6. 6 Attacker-Controlled Keys
  7. 7 Example: Password-based AE
  8. 8 Example: Reporting Plaintexts
  9. 9 Committing Security for AE
  10. 10 Reporting Salamanders
  11. 11 Invisible Salamanders for CTR Mode
  12. 12 Galois/Counter Mode (GCM)
  13. 13 Colliding GCM's MACA
  14. 14 From Two Keys to Many A
  15. 15 Multi-Receiver Encryption
  16. 16 Abuse Reporting for Encrypted Messaging
  17. 17 Facebook's Message Franking Protocol
  18. 18 Evading Message Franking
  19. 19 Crafting the Ciphertext
  20. 20 Partitioning Oracles
  21. 21 Preventing Invisible Salamanders

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.