×
  • Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
 

When Crypto Attacks! (Yahoo 2009)

by Engineer at Root Labs on Jun 10, 2009

  • 6,464 views

In-depth list of attacks against various crypto implementations. Developers seem to have gotten the message not to design their own ciphers. Now, we're trying to get the message out that you shouldn't ...

In-depth list of attacks against various crypto implementations. Developers seem to have gotten the message not to design their own ciphers. Now, we're trying to get the message out that you shouldn't be implementing your own crypto protocols or constructions, using low-level crypto libraries. Instead, developers should work at a higher level, using libraries like GPGME, Keyczar, or cryptlib. If you do end up designing/implementing your own construction, getting it reviewed by a third party is an expensive but vital task.

Statistics

Views

Total Views
6,464
Views on SlideShare
5,606
Embed Views
858

Actions

Likes
7
Downloads
104
Comments
0

7 Embeds 858

http://rdist.root.org 821
http://datenkeller.wordpress.com 22
http://www.slideshare.net 9
http://localhost 3
http://static.slideshare.net 1
http://www.4624.info 1
http://translate.googleusercontent.com 1
More...

Accessibility

Categories

Upload Details

Uploaded via SlideShare as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
Post Comment
Edit your comment

When Crypto Attacks! (Yahoo 2009) When Crypto Attacks! (Yahoo 2009) Presentation Transcript