Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Exposing Crypto Bugs through reverse engineering

URL
http://mirror.fem-net.de/CCC/26C3/mp4/26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.mp4
File name
26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.mp4
File size
502.1 MB
MD5
e35a243636fa3ad0ab20f0d3275cc9be
SHA1
f47c0201f16286b504322db6c197f6652acec730

Breaking good crypto is hard. It takes a genius to find a flaw in AES or Blowfish. On the other hand, it is also difficult to program cryptography correctly. Thus the simpler way of breaking a cryptographic software is often to reverse engineer it and find the crypto errors that were made by the programmers. In this talk the simple errors will be demonstrated that were discovered when reverse engineering three products for evaluation or forensic purposes. In each case, a simple error gave access to information that was supposed to be protected by the best crypto algorithms. The demos will be the following: * the FIPS 142-3 level 2 certified MXI stealth USB key (before it got patched) * a version of the E-capsule private safe from EISST * Data Beckers now defunct Private Safe software

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !