Finding the Weak Crypto Needle in a Byte Haystack

Provided by: SecurityTube.net
Topic: Software
Format: Webcast
Using the same stream cipher key twice is known to be a very bad idea, but keystream-resuse vulnerabilities are still very much a thing of the present - both in legitimate software and in the malware landscape. In this webcast, the presenter will describe a heuristic algorithm which can detect vulnerabilities of this kind.

Find By Topic