Completed
Conclusion
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Nonce-Disrespecting Adversaries - Practical Forgery Attacks on GCM in TLS
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Getting Started
- 3 TLS Encryption
- 4 symmetric encryption
- 5 lucky 13 attack
- 6 RC4 attack
- 7 GCM
- 8 Other cryptographers
- 9 Adam Langley
- 10 TLS specification
- 11 Scanning the Internet
- 12 Tracking Devices
- 13 Radware
- 14 Devices
- 15 Sign For
- 16 OpenSSL 101
- 17 Attack Description
- 18 GCM Background
- 19 GCM Authentication
- 20 Highlevel attackers
- 21 Lowlevel attackers
- 22 Nonce reuse
- 23 Fully known polynomial
- 24 Application in TLS
- 25 GCM stream cipher
- 26 Changing the HTML response
- 27 Attacking the same domain
- 28 Future trends
- 29 Conclusion
- 30 GitHub
- 31 Session Key
- 32 Problems with GCM
- 33 Weak keys in GCM
- 34 What can we bring to hardware vendors