Cryptography standards

XML Encryption

XML Encryption, also known as XML-Enc, is a specification, governed by a W3C recommendation, that defines how to encrypt the contents of an XML element. Although XML Encryption can be used to encrypt any kind of data, it is nonetheless known as "XML Encryption" because an XML element (either an EncryptedData or EncryptedKey element) contains or refers to the cipher text, keying information, and algorithms. Both XML Signature and XML Encryption use the KeyInfo element, which appears as the child of a SignedInfo, EncryptedData, or EncryptedKey element and provides information to a recipient about what keying material to use in validating a signature or decrypting encrypted data. The KeyInfo element is optional: it can be attached in the message, or be delivered through a secure channel. XML Encryption is different from and unrelated to Transport Layer Security, which is used to send encrypted messages (including xml content, both encrypted and otherwise) over the internet. It has been reported that this specification has severe security concerns. (Wikipedia).

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Network Security: Classical Encryption Techniques

Fundamental concepts of encryption techniques are discussed. Symmetric Cipher Model Substitution Techniques Transposition Techniques Product Ciphers Steganography

From playlist Network Security

Video thumbnail

Learn XML Tutorial Part 1

Here I introduce XML by covering: XML Basics, Explain what it can do, Compare it to HTML, Explain tags and elements, Show you what XML looks like, Explain the encoding attributes.

From playlist XML Tutorial

Video thumbnail

Symmetric Key Cryptography: The XOR Cipher

This is the fourth in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers the XOR logical operation, that is the exclusive OR operation, explaining how it can be used to encrypt and decrypt a sequence of binary digits. XOR is an im

From playlist Cryptography

Video thumbnail

Advanced Encryption Standard (AES)

Fundamental concepts of Advanced Encryption Standard are discussed. Basic structure of AES is presented. AES Decryption is explained. AES Structure AES Round Function AES Key Expansion AES Decryption

From playlist Network Security

Video thumbnail

IP Security: Part 2

Fundamental concepts of IPSec are discussed. Authentication Header is explained. Encapsulating Security Payload (ESP) and Internet Key Exchange (IKE) are analyzed.

From playlist Network Security

Video thumbnail

Network Security, Part 2 : Public Key Encryption

Fundamental concepts of public key encryption are discussed. RSA encryption method explained with an example. Confidentiality of message is presented.

From playlist Cryptography, Security

Video thumbnail

DeepSec 2013: Mobile Fail: Cracking Open "Secure" Android Containers

For more information and to download the video visit: http://bit.ly/DS13_info Playlist Deepsec 2013: http://bit.ly/DS13_pl Slides: http://bit.ly/1bZeVhO Speaker: Chris John Riley Chris John Riley explains the security of Android containers on mobile phones. His presentation was held at D

From playlist DeepSec 2013

Video thumbnail

28C3: Time is on my Side (en)

For more information visit: http://bit.ly/28C3_information To download the video visit: http://bit.ly/28C3_videos Playlist 28C3: http://bit.ly/28C3_playlist Speaker: Sebastian Schinzel Exploiting Timing Side Channel Vulnerabilities on the Web Timing side channel attacks are non-

From playlist 28C3: Behind Enemy Lines

Video thumbnail

DeepSec 2009: Key Management Death Match? Competing KM Standards Technical Deep Dive

Thanks to the DeepSec organisation for making these videos available and let me share the videos on YouTube. Speaker: Marc Massar Key management is a cornerstone of managing and deploying cryptographic devices. Marc Massar discusses the problems connected to key management and standards

From playlist DeepSec 2009

Video thumbnail

OWASP AppSec 2010: BitFlip: Determine a Data's Signature Coverage from Within the Application 1/2

Clip 1/2 Speaker: Henrich Christopher Poehls, University of Passau - ISL Despite applied cryptographic primitives applications are working on data that was not protected by them. We show by abstracting the message flow between the application and the underlying wire, that protection is

From playlist OWASP AppSec 2010

Video thumbnail

Network Security, Part 1 : Basic Encryption Techniques

Fundamental concepts of network security are discussed. It provides a good overview of secret Key and public key Encryption. Important data encryption standards are presented.

From playlist Network Security

Video thumbnail

(Audio only) Wassup MOM? Owning the Message Oriented Middleware - Gursev Singh Kalra

(Audio only) Wassup MOM? Owning the Message Oriented Middleware - Gursev Singh Kalra Message Oriented Middleware (MOM) allows disparate applications to communicate with each other by exchanging information in the form of messages. A MOM and its clients create an enterprise messaging appli

From playlist AppSecUSA 2013

Video thumbnail

DEFCON 15: Stealing Identity Management Systems

Speaker: Plet Novell's Identity Manager and related components are become fairly common in large networks. Identity management systems in general bring a number of security implications that are often not well understood. Even when best practices are followed, the system often has vulnera

From playlist DEFCON 15

Video thumbnail

PowerShell+ 2019 - Securing PowerShell: Hands-On Lab by Ashley McGlone

Every year at the PowerShell Summit Lee Holmes amazes us with his security talk. Attend this session after Lee's to see how you, too, can implement PowerShell security features in your environment. This will be a hands-on session where you are invited to follow along to do script block log

From playlist PowerShell + DevOps Global Summit 2019

Video thumbnail

CERIAS Security: Minimizing Trust Liabilities in Secure Group Messaging Infrastructures 3/5

Clip 3/5 Speaker: Himanshu Khurana · University of Illinois at Urbana-Champaign Large-scale collaborative applications are characterized by a large number of users and other processing end entities that are distributed over geographically disparate locations. Therefore, these applicat

From playlist The CERIAS Security Seminars 2005 (1)

Video thumbnail

Symmetric Key Cryptography: The Caesar Cipher

This is the first in a series about cryptography; an extremely important aspect of computer science and cyber security. It introduces symmetric key cryptography with a well known substitution cipher, namely the Caesar Cipher. It includes a few examples you can try for yourself using diff

From playlist Cryptography

Video thumbnail

DEFCON 14: First We Break Your Tag, Then We Break Your Systems Attacks to Rfid Systems

Speaker: Lukas Grunwald Abstract: This talk provides an overview of new RFID Technologie used for Dual-Interfaces Cards (Credit cards, Ticketing and Passports), and RFID Tags with encryption and security features. Problems and attacks to these security features are discussed and attacks

From playlist DEFCON 14

Related pages

XML Signature