Dos, Donts and How-Tos of crypto building blocks using Java

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • aNullValue
    Moderator
    • Jun 2019
    • 584

    #1

    Dos, Donts and How-Tos of crypto building blocks using Java

    Do you feel unequipped to understand real world crypto attacks? Are you overwhelmed with the over-abundance of choices provided by any modern cryptography API, to make a secure decision while choosing a randomness provider, encryption scheme or digital signature APIs? Are you on top of all the latest happenings in cryptographic communities, to know which cryptographic primitives is deemed broken? Due to sheer lack of documentation of the chosen API, do you feel paralyzed on where and how to start designing or analyzing any cryptographic systems?

    If any of these answers are "yes", come join me in this talk. I will be going over each cryptographic primitive like Random Number Generators, Encryption/Decryption algorithms, message authentication codes, digital signatures, password storage etc pointing out dos and donts based on evaluating bunch of leading cryptographic implementations. Java being one of the most widely used enterprise language, and simultaneously one of the most chaotic cryptography architecture, we chose it to get into some live coding exercises to showcase its secure usage, while also future-proofing your cryptographic applications.

    Speaker(s): Mansi Sheth

    Location: Crypto & Privacy Vlg

    Discord: https://discord.com/channels/7082082...34002011832320

    Event starts: 2020-08-07 13:00 (01:00 PM) PDT (UTC -07:00)

    Event ends: 2020-08-07 14:00 (02:00 PM) PDT (UTC -07:00)

    For the most up-to-date information, please either visit https://info.defcon.org, or use HackerTracker, which is available for iOS and Android. This is an automated message, and this data was last modified 2020-07-30T05:21 (UTC).
    Starts
    August 7, 2020 13:00
    Ends
    August 7, 2020 14:00
    Location
    Crypto & Privacy Vlg
Working...