Finding the Weak Crypto Needle in a Byte Haystack

Using the same stream cipher key twice is known to be a very bad idea, but keystream-resuse vulnerabilities are still very much a thing of the present - both in legitimate software and in the malware landscape. In this webcast, the presenter will describe a heuristic algorithm which can detect vulnerabilities of this kind.

Provided by: SecurityTube.net Topic: Software Date Added: Jan 2015 Format: Webcast

Find By Topic