25-CCNA Security 640-554 (Chapter 7 - Cryptography
I created this video with the YouTube Video Editor (http://www.youtube.com/editor)
By: CCNA CCNP Lectures
Excerpt from:
25-CCNA Security 640-554 (Chapter 7 - Cryptography - Video
25-CCNA Security 640-554 (Chapter 7 - Cryptography
I created this video with the YouTube Video Editor (http://www.youtube.com/editor)
By: CCNA CCNP Lectures
Excerpt from:
25-CCNA Security 640-554 (Chapter 7 - Cryptography - Video
26-CCNA Security 640-554 (Chapter 7 - Cryptography
I created this video with the YouTube Video Editor (http://www.youtube.com/editor)
By: CCNA CCNP Lectures
More:
26-CCNA Security 640-554 (Chapter 7 - Cryptography - Video
Winter School on Cryptography Symmetric Encryption in Theory and in Practice: Opening remarks
The topic of the 4th Annual Bar-Ilan Winter School on Cryptography held in January 2014, was Symmetric Encryption in Theory and in Practice. The winter schoo...
By: barilanuniversity
Post Snowden Cryptography or Who Holds Your Keys?
By: secappdev org
Go here to read the rest:
Post Snowden Cryptography or Who Holds Your Keys? - Video
Public-key cryptography
Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic algorithms which require two separate keys, one of which is secret and one of which is public. Although...
By: encyclopediacc
Go here to see the original:
Public-key cryptography - Video
Winter School on Cryptography Symmetric Encryption: Modern symmetric encryption - Thomas Ristenpart
Modern symmetric encryption, tweakable PRPs, shuffling, a lecture by Thomas Ristenpart. The topic of the 4th Annual Bar-Ilan Winter School on Cryptography he...
By: barilanuniversity
Read the original:
Winter School on Cryptography Symmetric Encryption: Modern symmetric encryption - Thomas Ristenpart - Video
Winter School on Cryptography Symmetric Encryption: Attacks Against Record Layers - Kenny Paterson
Attacks against record layers, a lecture by Kenny Paterson. The topic of the 4th Annual Bar-Ilan Winter School on Cryptography held in January 2014, was Symm...
By: barilanuniversity
Go here to read the rest:
Winter School on Cryptography Symmetric Encryption: Attacks Against Record Layers - Kenny Paterson - Video
Winter School on Cryptography Symmetric Encryption: Format-preserving encryption - Thomas Ristenpart
Format-preserving encryption, a lecture by Thomas Ristenpart. The topic of the 4th Annual Bar-Ilan Winter School on Cryptography held in January 2014, was Sy...
By: barilanuniversity
See the rest here:
Winter School on Cryptography Symmetric Encryption: Format-preserving encryption - Thomas Ristenpart - Video
AusCERT History is filled with companies shamed by their shoddy cryptography implementations even though the underlying maths is bang on.
In a presentation titled "Crypto Won't Save You" at the AusCERT conference on Australia's Gold Coast, respected cryptographer Peter Gutmann of the University of Auckland took security bods through a decade of breaches featuring a laundry list of the world's biggest brands.
Gutmann's point was to demonstrate how the weakest point of cryptography was typically in its implementation rather than the maths itself. He demonstrated that consumer devices from the Amazon Kindle to the Sony Playstation and Microsoft Xbox consoles were hacked not because of weak cryptography, but due to poor deployment of security mechanisms, which were bypassed by attackers.
Many more systems have been broken due to poor implementations. The crypto used by lower-end ransomware to encrypt victims' files can be broken by security pros, allowing the documents to be rescued without having to pay the ransom.
"No matter how strong the crypto was, the attackers walked around it," the Cryptlib developer told delegates.
"Crypto is not any good to you when it can be so easily bypassed. The lesson is you need to secure every part of the system and not just throw crypto at one bit and assume that you'll be safe."
Prof Peter Gutmann at AusCERT
Gutmann highlighted further crypto bypass gore by pointing to the use of weak keys in DomainKeys Identified Mail (DKIM) by thousands of organisations including of Google, Paypal and Twitter.
While the US Computer Emergency Response Team (CERT) warned companies in October 2012 to upgrade to stronger keys to avoid being popped, Gutmann said attackers took the easier route and bypassed the implementations.
"There were so many other ways to render DKIM ineffective that no one bothered attacking the crypto," he said.
The rest is here:
Crypto-guru slams 'NSA-proof' tech, says today's crypto is strong enough