Skip to content

Latest commit

 

History

History
22 lines (17 loc) · 620 Bytes

crypto_attacks.md

File metadata and controls

22 lines (17 loc) · 620 Bytes
layout title
default
Crypto Attacks

This is the second in a series of 3 sessions on practical cryptography. In this session we'll talk about a number of practical attacks you can use on cryptosystems in the real world.

What you'll learn

  • Stream cipher key reuse
  • ECB block reordering
  • ECB decryption
  • Padding and padding oracles
  • Hash length extension

Video

<iframe id="ytplayer" type="text/html" width="640" height="360" src="https://www.youtube-nocookie.com/embed/jtcpREJLN1Y?rel=0&autoplay=0&origin={{ site.url }}" frameborder="0"></iframe>