Course Introduction
Course Introduction
pdf
Applied Cryptography
Termionology
pdf
pptx
Cryptography Introduction
pdf
pptx
https://en.wikipedia.org/wiki/History_of_cryptography
http://en.wikipedia.org/wiki/Symmetric-key_algorithm
Block Cipher
AES
pdf
pptx
FIPS 197
http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
Watch an
AES flash demo
in your web browser
Stick Figure
Guide
to AES
pdf version
pptx version
AES ff_mult
examples
Block Cipher Modes and Padding
pdf
pptx
block modes
Padding
Feistel Model
pdf
pptx
Feistel Cipher
Use an inductive proof to show that the model works
Cryptographic Hash Function
pdf
pptx
Cryptographic Hash Function
Hash Function
Birthday Attack
SHA-3
NIST Hash Project
Chinese researchers find first SHA-1 collision 2005
Google announces practical collsion SHA-1, Feb 2017
MAC
pdf
pptx
HMAC
Length Extension Attack
Hash Length Extension Attacks
Flickr Extension Attack
DH
pdf
pptx
Diffie-Hellman Key Exchange
Diffie-Hellman Protocol
How does Mallory conduct a Man-in-the-Middle attack?
RSA
pdf
pptx
RSA
Digital Signatures
pdf
pptx
cryptographic doom
sign-and-encrypt
order of sign versus encrypt
order of mac versus encrypt
Certificates
pdf
pptx
PKI
Trusted Third Party
DigiNotar attack
Verisign Attack 2001
Authentication
Transport Layer Security (TLS)
pdf
pptx
TLS
(see handshake description)
EXAMPLE
TLS cipher name example
Passwords
pdf
pptx
Beyond passwords - Multifactor auth, pasword vaults, single signon
How the Bible and Youtube are Fueling the Next Frontier of Password Cracking
How to Devise Passwords that Drive Hackers Away
PBKDF2
Software Security
Buffer Overflow Attacks
pdf
pptx
Smashing the Stack for Fun and Profit
Buffer Overflow Protection
Bypassing StackGuard
- Phrack article explaining weakness that led to XOR canary
Stack Frame Layout
Secure Email
pdf
pptx
Social Engineering
pdf
pptx
Top Social Engineering Scams of 2017
Ways to Make Yourself Hack Proof