Finding the Weak Crypto Needle in a Byte Haystack

Provided by: Topic: Software Date Added: Jan 2015 Format: Webcast
Using the same stream cipher key twice is known to be a very bad idea, but keystream-resuse vulnerabilities are still very much a thing of the present - both in legitimate software and in the malware landscape. In this webcast, the presenter will describe a heuristic algorithm which can detect vulnerabilities of this kind.

Find By Topic