layout | title |
---|---|
default |
Crypto Attacks |
This is the second in a series of 3 sessions on practical cryptography. In this session we'll talk about a number of practical attacks you can use on cryptosystems in the real world.
- Stream cipher key reuse
- ECB block reordering
- ECB decryption
- Padding and padding oracles
- Hash length extension
<iframe id="ytplayer" type="text/html" width="640" height="360" src="https://www.youtube-nocookie.com/embed/jtcpREJLN1Y?rel=0&autoplay=0&origin={{ site.url }}" frameborder="0"></iframe>