Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on May 30, 2016
Do you think that your opponent's data is encrypted or authenticated by a particular cryptographic system? Do you think that your goal is to attack that system? Think bigger! There is a huge ecosystem that designs, evaluates, standardizes, selects, implements, and deploys cryptographic systems. This ecosystem is a much broader attack target than any particular cryptographic system is. This talk will give a few examples of ways that you can exploit the ecosystem.