Message authentication codes | Hashing
In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. As with any MAC, it may be used to simultaneously verify both the data integrity and authenticity of a message. HMAC can provide authentication using a shared secret instead of using digital signatures with asymmetric cryptography. It trades off the need for a complex public key infrastructure by delegating the key exchange to the communicating parties, who are responsible for establishing and using a trusted channel to agree on the key prior to communication. (Wikipedia).
From playlist 'Sleeping Sun' videos.
From playlist 'Sleeping Sun' videos.
DEFCON 18: Exploiting Internet Surveillance Systems 2/3
Speaker: Decius For many years people have been debating whether or not surveillance capabilities should be built into the Internet. Cypherpunks see a future of perfect end to end encryption while telecom companies are hard at work building surveillance interfaces into their networks. D
From playlist DEFCON 18-1
Black Hat USA 2010: Unauthorized Internet Wiretapping: Exploiting Lawful Intercept 2/4
Speaker: Tom Cross For many years people have been debating whether or not surveillance capabilities should be built into the Internet. Cypherpunks see a future of perfect end to end encryption while telecom companies are hard at work building surveillance interfaces into their networks.
From playlist BH USA 2010 - PRIVACY
OWASP AppSec EU 2013: Improving the Security of Session Management in Web Applications
For more information and to download the video visit: http://bit.ly/appseceu13 Playlist OWASP AppSec EU 2013: http://bit.ly/plappseceu13 Speakers: Lieven Desmet | Wouter Joosen | Frank Piessens | Philippe De Ryck Session management is a critical component of modern web applications, allo
From playlist OWASP AppSec EU 2013
Speakers: Ralf-Philipp Weinmann, Jacob Appelbaum An analysis of Apple's encrypted disk storage system Analysis of the MacOS X storage encryption technology FileVault. Having fun by reverse-engineering private Frameworks under MacOS X. We present an analysis of Apple's proprietary di
From playlist 23C3: Who can you trust
PGConf NYC 2021 - Get Your Insecure PostgreSQL Passwords to SCRAM! by Jonathan S. Katz
Get Your Insecure PostgreSQL Passwords to SCRAM! by Jonathan S. Katz Passwords: they just seem to work. You connect to your PostgreSQL database and you are prompted for your password. You type in the correct character combination, and presto! you're in, safe and sound. But what if I tol
From playlist PGConf NYC 2021
Ruby Conf 2013 - Being Boring: A Survival Guide to Ruby Cryptography
We all know that security is hard, and that math is hard, but what happens when you put them together? Cryptography is an increasingly essential tool for building secure systems, but also a perilous minefield where any number of mistakes can lead to insecure systems. This talk will take y
From playlist Ruby Conf 2013 - Miami Beach, FL
Tim Taubert: Keeping secrets with JavaScript | JSConf EU 2014
With the web slowly maturing as a platform the demand for cryptography in the browser has risen, especially in a post-Snowden era. Many of us have heard about the upcoming Web Cryptography API but at the time of writing there seem to be no good introductions available. We will take a look
From playlist JSConf EU 2014
Homenagem ao HMHS Britannic Musica: Nightwish Sleeping sun
From playlist 'Sleeping Sun' videos.
In this session, Cory discusses the tools for using cryptography in Swift, and introduces a new Apple open source project for working with cryptography on all platforms, Swift Crypto. PUBLICATION PERMISSIONS: Original video was published with the Creative Commons Attribution license (reus
From playlist Blockchain
TLS Record Protocol - Applied Cryptography
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
From playlist Applied Cryptography
All the network is a stage, and the APKs merely players - Daniel Peck
All the network is a stage, and the APKs merely players: Scripting Android Applications - Daniel Peck The existance of open well defined APIs for many popular websites has been a boon to spammers, but as they have grown in popularity the operators have begun to care more about the integri
From playlist AppSecUSA 2013