Cryptographic attacks | Theory of cryptography

Key-recovery attack

A key-recovery attack is an adversary's attempt to recover the cryptographic key of an encryption scheme. Normally this means that the attacker has a pair, or more than one pair, of plaintext message and the corresponding ciphertext. Historically, cryptanalysis of block ciphers has focused on key-recovery, but security against these sorts of attacks is a very weak guarantee since it may not be necessary to recover the key to obtain partial information about the message or decrypt message entirely. Modern cryptography uses more robust notions of security. Recently, indistinguishability under adaptive chosen-ciphertext attack (IND-CCA2 security) has become the "golden standard" of security. The most obvious key-recovery attack is the exhaustive key-search attack. But modern ciphers often have a key space of size or greater, making such attacks infeasible with current technology. (Wikipedia).

Video thumbnail

Correctness And Security - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Tutorial: GeoHTTP Remote Buffer Overflow and DoS

A real example of a Buffer Overflow/Denial of Service attack! My favorite video: http://www.youtube.com/watch?v=z00kuZIVXlU Visit http://binslashshell.wordpress.com and join our forum community!!! This is a video showing what a Buffer Overflow Aattck can do to a Web Server. For th

From playlist Denial of Service attacks

Video thumbnail

Storing Passwords Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Intrusion Detection: Part 2

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

SYN Flood - Denial of Service

SYN Flood Denial of Service attack using perl script and hping3 tool.

From playlist Denial of Service attacks

Video thumbnail

How to Build a KeyLogger in C++ | Session 11| #C | #programming

Don’t forget to subscribe! This project series is about creating a Keylogger in C++. A KeyLogger is a program that can capture every key or click that is pressed on the computer asynchronously. In order to get useful information, we will learn how to erase the cache, build the keylogger

From playlist Build A KeyLogger In C++

Video thumbnail

Secure Shell Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

DeepSec 2013: Trusted Friend Attack: Guardian Angels Strike

For more information and to download the video visit: http://bit.ly/DS13_info Playlist Deepsec 2013: http://bit.ly/DS13_pl Speaker: Ashar Javed Ashar Javed (Chair of Network & Data Security, Ruhr University Bochum, Germany) explains the concept of the Trusted Friend Attack at DeepSec 201

From playlist DeepSec 2013

Video thumbnail

27c3: News Key Recovery Attacks on RC4/WEP (en)

Speaker: Martin Vuagnoux In this paper, we present several weaknesses in the stream cipher RC4. First, we present a technique to automatically reveal linear correlations in the PRGA of RC4. With this method, 48 new exploitable correlations have been discovered. Then we bind these new b

From playlist 27C3: We come in peace

Video thumbnail

Intrusion Detection: Part 1

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Ledger Hack: SIM Swap Attack. Protect Yourself Now. Right Now. Learn How.

One of the biggest risks to cryptocurrency owners is SIM swapping. With the ledger hack, we're once again seeing an influx of SIM swap attacks. What is a SIM swap attack? How can you protect yourself from SIM swaps? Learn what you need to do right now. Chapters 0:00 Your hardware wallet

From playlist Ledger Hack Playlist

Video thumbnail

DEFCON 20: Into the Droid: Gaining Access to Android User Data

Speaker: THOMAS CANNON DIRECTOR OF RESEARCH AND DEVELOPMENT, VIAFORENSICS This talk details a selection of techniques for getting the data out of an Android device in order to perform forensic analysis. It covers cracking lockscreen passwords, creating custom forensic ramdisks, bypassing

From playlist DEFCON 20

Video thumbnail

How to Build a KeyLogger in C++ | Session 20 | #C | #programming

Don’t forget to subscribe! This project series is about creating a Keylogger in C++. A KeyLogger is a program that can capture every key or click that is pressed on the computer asynchronously. In order to get useful information, we will learn how to erase the cache, build the keylogger

From playlist Build A KeyLogger In C++

Video thumbnail

Bitcoin Q&A: Threshold Signatures and Shamir Secret Sharing

What are keyless, seedless threshold signatures? Does it have advantages over multi-signature schemes? What are the best practices for key storage by organizations? What is SLIP-39? How do I turn a BIP-39 recovery seed into K-of-N Shamir sharing scheme? Chapters 0:00 What are keyless, see

From playlist Bitcoin Q&A

Video thumbnail

EEVblog #1006 - Trezor Bitcoin Hardware Wallet Teardown

What's inside the Trezor hardware bitcoin wallet? A teardown to look at any physical hardware security, and a look at a possible side channel power line attack. http://amzn.to/2uk2ccP https://kit.com/EEVblog/crypto-hardware UPDATE: A technical detailed reply from the Trezor developer! htt

From playlist Cryptocurrency

Video thumbnail

Help! Ledger Hack.What is it? What should you do right now to protect youself? Emergency Livestream

The Ledger hack is estimated to have affected around 300,000 people. You bought a hardware wallet to keep your crypto safe. phishing attacks, sim swaps, and extortion threats are now happening to those affected. Names, addresses, phone numbers, email addresses, what's known as personally i

From playlist Ledger Hack Playlist

Video thumbnail

EEVblog #1048 - Ledger Nano S Crypto Hardware Wallet

A review and teardown of the Ledger Nano S crypto currency hardware wallet. Installation, setup, and transferring bitcoin cash, ethereum, and ripple. And a comparison with the Trezor, which one is better? Buy them here: https://kit.com/EEVblog/crypto-hardware Secure chip: http://www.st.co

From playlist Product Reviews & Teardowns

Video thumbnail

DeepSec 2013: The Boomerang Effect -- Using Session Puzzling To Attack Apps From The Backend

For more information and to download the video visit: http://bit.ly/DS13_info Playlist Deepsec 2013: http://bit.ly/DS13_pl Slides: http://bit.ly/1kOTLuR Speaker: Shay Chen In his talk at DeepSec 2013 Shay Chen (Hacktics ASC, Ernst & Young) explains attacks originating from backends: "Alt

From playlist DeepSec 2013

Video thumbnail

How to Build a KeyLogger in C++ | Session 10| #C | #programming

Don’t forget to subscribe! This project series is about creating a Keylogger in C++. A KeyLogger is a program that can capture every key or click that is pressed on the computer asynchronously. In order to get useful information, we will learn how to erase the cache, build the keylogger

From playlist Build A KeyLogger In C++

Video thumbnail

EEVblog #1062 - Trezor Model T Hardware Wallet Review

Unboxing and review of the new Trezor Model T cryptocurrency bitcoin hardware wallet. And a comparison with the Ledger Nano S. Also a talk on Ethereum contracts, Myetherwaller and ICO's Crypto Currency: https://www.eevblog.com/crypto-currency/ https://kit.com/EEVblog/crypto-hardware Hard

From playlist Cryptocurrency

Related pages

Plaintext | Ciphertext indistinguishability | Ciphertext | Cipher | Computer security | Algorithm | Key (cryptography) | Cryptography