Cryptographic algorithms

Cryptographic agility

Cryptographic agility (also referred to as crypto-agility) is a practice paradigm in designing information security protocols and standards in a way so that they can support multiple cryptographic primitives and algorithms at the same time. Then the systems implementing a particular standard can choose which combination of primitives they want to use. The primary goal of cryptographic agility was to enable rapid adaptations of new cryptographic primitives and algorithms without making disruptive changes to the systems' infrastructure. Cryptographic agility acts as a safety measure or an incident response mechanism when a cryptographic primitive of a system is discovered to be vulnerable. A security system is considered crypto agile if its cryptographic algorithms or parameters can be replaced with ease and is at least partly automated. The impending arrival of a quantum computer that can break existing asymmetric cryptography is raising awareness of the importance of cryptographic agility. (Wikipedia).

Video thumbnail

Black Hat USA 2010: Cryptographic Agility: Defending Against the Sneakers Scenario 1/5

Speaker: Bryan Sullivan In the movie Sneakers, a brilliant young mathematician invents a device that defeats a public-key encryption algorithm. An interesting fiction, but what if this happened in real life? All of your applications using that algorithm would need to be changed as quickly

From playlist BH USA 2010 - WHERE DATA LIVES

Video thumbnail

Correctness And Security - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Correctness And Security Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Black Hat USA 2010: Cryptographic Agility: Defending Against the Sneakers Scenario 2/5

Speaker: Bryan Sullivan In the movie Sneakers, a brilliant young mathematician invents a device that defeats a public-key encryption algorithm. An interesting fiction, but what if this happened in real life? All of your applications using that algorithm would need to be changed as quickly

From playlist BH USA 2010 - WHERE DATA LIVES

Video thumbnail

Summary - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Totient Function - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

OWASP AppSec EU 2013: Recipes for enabling HTTPS

For more information and to download the video visit: http://bit.ly/appseceu13 Playlist OWASP AppSec EU 2013: http://bit.ly/plappseceu13 Speakers: Nelis Boucké | Thomas Herlea | Johan Peeters Securely enabling HTTPS turns out to be tricky and time consuming. There is the considerable acc

From playlist OWASP AppSec EU 2013

Video thumbnail

Black Hat USA 2010: Cryptographic Agility: Defending Against the Sneakers Scenario 3/5

Speaker: Bryan Sullivan In the movie Sneakers, a brilliant young mathematician invents a device that defeats a public-key encryption algorithm. An interesting fiction, but what if this happened in real life? All of your applications using that algorithm would need to be changed as quickly

From playlist BH USA 2010 - WHERE DATA LIVES

Video thumbnail

Secure Computation Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

30C3: The Year in Crypto (EN)

For more information and to download the video visit: http://bit.ly/30C3_info Playlist 30C3: http://bit.ly/30c3_pl Speakers: Nadia Heninger | djb | Tanja Lange This was a busy year for crypto. TLS was broken. And then broken again. Discrete logs were computed. And then computed again.

From playlist 30C3

Video thumbnail

Black Hat USA 2010: Cryptographic Agility: Defending Against the Sneakers Scenario 4/5

Speaker: Bryan Sullivan In the movie Sneakers, a brilliant young mathematician invents a device that defeats a public-key encryption algorithm. An interesting fiction, but what if this happened in real life? All of your applications using that algorithm would need to be changed as quickly

From playlist BH USA 2010 - WHERE DATA LIVES

Video thumbnail

Top Ten Proactive Web Application Controls - Jim Manico

top ten proactive web application controls - Managed by the official OWASP Media Project https://www.owasp.org/index.php/OWASP_Media_Project

From playlist AppSec California 2014

Video thumbnail

Symmetric Cryptosystems - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Bitcoin security, NFTs, El Salvador's Volcano Bond, and more! - December 2021 Q&A

In this Bitcoin and Open Blockchain Q&A, Andreas M. Antonopoulos answers questions about Bitcoin, NFTs, Security, Lightning Network, and More! 00:00 Start of Stream 00:47 Start of Sound 2:36 What are 3 things you're most optimistic about for Bitcoin in 2022 and what are 3 things that most

From playlist Bitcoin Q&A

Video thumbnail

The Future Of Software Development

From autonomous vehicles, 3D printed rocket engines, and “affordable” consumer-owned satellites to rapid advances in AI and secure, decentralized electronic currencies, the past several years have shown us that the only prediction we can confidently make about the future is that it will ar

From playlist Software Development

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Black Hat USA 2010: Attacking Kerberos Deployments 1/4

Speakers: Scott Stender, Brad Hill & Rachel Engel The Kerberos protocol is provides single sign-on authentication services for users and machines. Its availability on nearly every popular computing platform - Windows, Mac, and UNIX variants - makes it the primary choice for enterprise aut

From playlist BH USA 2010 - OS WARS

Related pages

Integer factorization | Encryption | Lattice-based cryptography | Data Encryption Standard | X.509 | Public key certificate | Cryptography | RSA (cryptosystem) | Information security | Cryptographic primitive | Post-quantum cryptography | Hash function | Discrete logarithm | Hash-based cryptography | RC4 | Symmetric-key algorithm | Elliptic-curve cryptography | Multivariate cryptography | Advanced Encryption Standard | Shor's algorithm | Quantum computing