Episode 10: Exploiting Authenticated Encryption Key Commitment!

Episode 10: Exploiting Authenticated Encrypti...

Suivant

Episode 24: CryptoHack's Collection of Cryptic Conundrums!

For several years, CryptoHack has been a free platform for learning modern cryptography through fun and challenging programming puzzles. From toy ciphers to post-quantum cryptography, CryptoHack has a wide-ranging and ever increasing library of puzzles for both the aspiring and a ...  Afficher plus

Episode 23: Psychic Signatures in Java!

On April 19th 2022, Neil Madden disclosed a vulnerability in many popular Java runtimes and development kits. The vulnerability, dubbed "Psychic Signatures", lies in the cryptography for ECDSA signatures and allows an attacker to bypass signature checks entirely for these signatu ...  Afficher plus

Épisodes Recommandés

Using bidirectionality override characters to obscure code. [Research Saturday]
CyberWire Daily

Guests Nicholas Boucher and Ross Anderson from the University of Cambridge join Dave Bittner to discuss their research, "Trojan Source: Invisible Vulnerabilities." The researchers present a new type of attack in which source code is maliciously encoded so that it appears differen ...  Afficher plus

S15:E6 - What is cryptography and how to get into it (Marcus Carey)
CodeNewbie

In this episode, we talk about cryptography with Marcus Carey, enterprise architect at ReliaQuest. Marcus talks about going to the military and learning cryptography, what cryptography is, and the foundational things you need to know in order to make sure the apps you’re building ...  Afficher plus

How Does Historical Cryptology Work?
BrainStuff

To crack ciphers written centuries ago, historical cryptologists have to be half artist, half accountant, and use some of the most powerful computing tools known today. Learn how a team cracked Mary, Queen of Scots's code in this episode of BrainStuff, based on this article: http ...  Afficher plus

brute-force attack (noun) [Word Notes]
Hacking Humans

A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered.