Cryptography standards

XML Signature

XML Signature (also called XMLDSig, XML-DSig, XML-Sig) defines an XML syntax for digital signatures and is defined in the W3C recommendation XML Signature Syntax and Processing. Functionally, it has much in common with PKCS #7 but is more extensible and geared towards signing XML documents. It is used by various Web technologies such as SOAP, SAML, and others. XML signatures can be used to sign data–a resource–of any type, typically XML documents, but anything that is accessible via a URL can be signed. An XML signature used to sign a resource outside its containing XML document is called a detached signature; if it is used to sign some part of its containing document, it is called an enveloped signature; if it contains the signed data within itself it is called an enveloping signature. (Wikipedia).

Video thumbnail

Digital Signatures: Part 1

Fundamental concepts of Digital Signatures are discussed. ElGamal and Schnorr Digital Signature schemes are analyzed. Digital signature standard is presented.

From playlist Network Security

Video thumbnail

Digital Signatures: Part 2

Fundamental concepts of Digital Signatures are discussed. ElGamal and Schnorr Digital Signature schemes are analyzed. Digital signature standard is presented.

From playlist Network Security

Video thumbnail

Certificates And Signatures Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Digital Signatures and Digital Certificates

This video explains the purpose of digital signatures and how they work. It begins by reviewing encryption and decryption using an asymmetric pair of keys, and then explains the significance of this when it comes to digital signatures, namely that it doesn’t matter which of the key pair i

From playlist Cryptography

Video thumbnail

Signatures - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

29C3: On Breaking SAML (EN)

Speaker: Andreas Mayer Be Whoever You Want to Be The Security Assertion Markup Language (SAML) is a widely adopted language for making security statements about subjects. It is a critical component for the development of federated identity deployments and Single Sign-On scenarios. In ord

From playlist 29C3: Not my department

Video thumbnail

OWASP AppSec 2010: BitFlip: Determine a Data's Signature Coverage from Within the Application 1/2

Clip 1/2 Speaker: Henrich Christopher Poehls, University of Passau - ISL Despite applied cryptographic primitives applications are working on data that was not protected by them. We show by abstracting the message flow between the application and the underlying wire, that protection is

From playlist OWASP AppSec 2010

Video thumbnail

OWASP AppSec EU 2013: RESTful security

For more information and to download the video visit: http://bit.ly/appseceu13 Playlist OWASP AppSec EU 2013: http://bit.ly/plappseceu13 Speaker: Erlend Oftedal REST services are quickly gaining in popularity due to their simplified nature compared to SOAP-driven web services. But while

From playlist OWASP AppSec EU 2013

Video thumbnail

Ruby OpenSSL Present Future and Why It Matters by Martin Boßlet

We will start with an overview of what exists today (Ruby 1.9.3) in Ruby's OpenSSL wrapper and how and where you can use it and why you should. After this brief introduction we will encounter new features that could find their way into future versions of Ruby OpenSSL. Among these is OpenSS

From playlist Ruby Conference 2011

Video thumbnail

Signature Validation - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Certificates And Signatures - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

DEFCON 15: Windows Vista Log Forensics

Speaker: Rich Murphey PhD Chief Scientist, White Oak Labs Event logging in Windows Vista is quite different in terms of the way events are stored on disk and the way they are used by applications. Vista uses a new encoding of event records that lends itself to much broader flexibility for

From playlist DEFCON 15

Video thumbnail

OWASP AppSec 2010: BitFlip: Determine a Data's Signature Coverage from Within the Application 2/2

Clip 2/2 Speaker: Henrich Christopher Poehls, University of Passau - ISL Despite applied cryptographic primitives applications are working on data that was not protected by them. We show by abstracting the message flow between the application and the underlying wire, that protection is

From playlist OWASP AppSec 2010

Video thumbnail

RailsConf 2021: ho Are You? Delegation, Federation, Assertions and Claims - Lyle Mullican

Identity management? Stick a username and (hashed) password in a database, and done! That's how many apps get started, at least. But what happens once you need single sign-on across multiple domains, or if you'd rather avoid the headache of managing those passwords to begin with? This sess

From playlist RailsConf 2021

Video thumbnail

Live CEOing Ep 403: Cryptography Review in Wolfram Language

In this episode of Live CEOing, Stephen Wolfram reviews upcoming functionality for cryptography features of the Wolfram Language. If you'd like to contribute to the discussion in future episodes, you can participate through this YouTube channel or through the official Twitch channel of Ste

From playlist Behind the Scenes in Real-Life Software Design

Video thumbnail

Black Hat USA 2010: Secure Use of Cloud Storage 4/5

Speaker: Grant Bugher Cloud storage systems like Microsoft's Windows Azure Storage and Amazon's Simple Storage Service allow web sites and services to cheaply store large amounts of data and make it available in a controlled manner. However, as with traditional methods of data storage and

From playlist BH USA 2010 - CLOUD VIRTUALIS

Video thumbnail

Schnorr Digital Signature

In this video I briefly go over the advantage to the Schnorr signature, and how to sign and verify.

From playlist Cryptography and Coding Theory

Video thumbnail

DeepSec 2007: Web 2.0 Application Kung-Fu - Securing Ajax & Web Services

Thanks to the DeepSec organisation for making these videos available and let me share the videos on YouTube. Speaker: Shreeraj Shah, Net Square Solutions Pvt. Ltd. With Web 2.0 applications being adopted by businesses at a very quick pace, security concerns around these technologies too

From playlist DeepSec 2007

Related pages

Detached signature | Binary data | Pretty Good Privacy | XAdES | X.509 | XML Encryption | PKCS 7 | PKIoverheid | Base64 | Canonical XML