SlideShare a Scribd company logo
Everything I always
wanted to know about
crypto but never thought
I’d understand
= = = ( P R E - T I T L E ) = = =
R
B
G
Y
Hello there, 16:9
I am a test slide to make sure everything looks good.
Everything I always
wanted to know about
crypto but never thought
I’d understand
S A S H A R O M I J N
S A S H A @ M X S A S H A . E U
@ M X S A S H
S A S H A R O M I J N
@ M X S A S H
S A S H A @ M X S A S H A . E U
S H E / H E R
1 Compute n = pq.
• n is used as the modulus for both the public and private keys. Its length, usually expressed in
bits, is the key length.
2 Compute φ(n) = φ(p)φ(q) = (p − 1)(q − 1) = n - (p + q -1), where φ is Euler's totient function. This
value is kept private.
3 Choose an integer e such that 1 < e < φ(n) and gcd(e, φ(n)) = 1; i.e., e and φ(n) are coprime.
• e is released as the public key exponent.
• e having a short bit-length and small Hamming weight results in more efficient encryption –
most commonly 216 + 1 = 65,537. However, much smaller values of e (such as 3) have been
shown to be less secure in some settings.[5]
4 Determine d as d ≡ e−1 (mod φ(n)); i.e., d is the modular multiplicative inverse of e (modulo φ(n)).
• This is more clearly stated as: solve for d given d⋅e ≡ 1 (mod φ(n))
• This is often computed using the extended Euclidean algorithm. Using the pseudocode in the
Modular integers section, inputs a and n correspond to e and φ(n), respectively.
• d is kept as the private key exponent.
@mxsashsasha@mxsasha.eu
(read as single line)
@mxsashsasha@mxsasha.eu
ibhknebufk'bjhsn
hifk'durtfcbu
(read as single line)
@mxsashsasha@mxsasha.eu
SINGLE BYTE XOR CIPHER
ibhknebufk'bjhsnhifk'durtfcbu
@mxsashsasha@mxsasha.eu
SINGLE BYTE XOR CIPHER
ibhknebufk'bjhsnhifk'durtfcbu
@mxsashsasha@mxsasha.eu
SINGLE BYTE XOR CIPHER
ibhknebufk'bjhsnhifk'durtfcbu
k
@mxsashsasha@mxsasha.eu
SINGLE BYTE XOR CIPHER
ibhknebufk'bjhsnhifk'durtfcbu
k
@mxsashsasha@mxsasha.eu
SINGLE BYTE XOR CIPHER
ibhknebufk'bjhsnhifk'durtfcbu
k
neoliberal emotional crusader
@mxsashsasha@mxsasha.eu
SINGLE BYTE XOR CIPHER
ibhknebufk'bjhsnhifk'durtfcbu
k
'i' / 0x69 / 0b01101001
k = 0x07 / 0b00000111
neoliberal emotional crusader
@mxsashsasha@mxsasha.eu
SINGLE BYTE XOR CIPHER
ibhknebufk'bjhsnhifk'durtfcbu
k
'i' / 0x69 / 0b01101001
k = 0x07 / 0b00000111
'n' / 0x6e / 0b01101110
neoliberal emotional crusader
@mxsashsasha@mxsasha.eu
ESSENTIAL PROPERTIES
Security must not depend on secrecy of
chosen algorithm or parameters - only key1
@mxsashsasha@mxsasha.eu
ESSENTIAL PROPERTIES
2
Ciphertext close to random and no hint to
structure of cleartext
Security must not depend on secrecy of
chosen algorithm or parameters - only key1
@mxsashsasha@mxsasha.eu
ESSENTIAL PROPERTIES
2
If cleartext changes slightly, ciphertext
changes dramatically3
Ciphertext close to random and no hint to
structure of cleartext
Security must not depend on secrecy of
chosen algorithm or parameters - only key1
@mxsashsasha@mxsasha.eu
ESSENTIAL PROPERTIES
2
If cleartext changes slightly, ciphertext
changes dramatically3
Capturing a cleartext with ciphertext
must not divulge key info4
Ciphertext close to random and no hint to
structure of cleartext
Security must not depend on secrecy of
chosen algorithm or parameters - only key1
@mxsashsasha@mxsasha.eu
ESSENTIAL PROPERTIES
2
If cleartext changes slightly, ciphertext
changes dramatically3
Capturing a cleartext with ciphertext
must not divulge key info4
Ciphertext close to random and no hint to
structure of cleartext
Security must not depend on secrecy of
chosen algorithm or parameters - only key1
~No faster method than full
bruteforce attack5
@mxsashsasha@mxsasha.eu
Advanced
Encryption
Standard
(AES) (2001)
@mxsashsasha@mxsasha.eu
BLOCK CIPHERS
16 bytes cleartext
@mxsashsasha@mxsasha.eu
BLOCK CIPHERS
16 bytes cleartext
16 bytes ciphertext
AES enc
128/192/256
bits key
@mxsashsasha@mxsasha.eu
AES ROUNDS
@mxsashsasha@mxsasha.eu
AES ROUNDS
@mxsashsasha@mxsasha.eu
AES ROUNDS
@mxsashsasha@mxsasha.eu
AES ROUNDS
@mxsashsasha@mxsasha.eu
BLOCK CIPHERS
16 bytes cleartext
16 bytes ciphertext
AES enc
128/192/256
bits key
@mxsashsasha@mxsasha.eu
BLOCK CIPHER MODE
16b cleartxt
16b ciphertxt
AES enck
@mxsashsasha@mxsasha.eu
BLOCK CIPHER MODE
16b cleartxt
16b ciphertxt
AES enck
16b cleartxt
16b ciphertxt
AES enck
@mxsashsasha@mxsasha.eu
BLOCK CIPHER MODE
Electronic code book (ECB)
16b cleartxt
16b ciphertxt
AES enck
16b cleartxt
16b ciphertxt
AES enck
https://commons.wikimedia.org/wiki/File:Tux_ecb.jpg
@mxsashsasha@mxsasha.eu
BLOCK CIPHER MODE
Cipher block chaining (CBC)
16b cleartxt
16b ciphertxt
AES enck
16b cleartxt
16b ciphertxt
AES enck
@mxsashsasha@mxsasha.eu
BLOCK CIPHER MODE
Cipher block chaining (CBC)
16b cleartxt
16b ciphertxt
AES enck
16b cleartxt
16b ciphertxt
AES enck
IV
@mxsashsasha@mxsasha.eu
BLOCK CIPHER MODE
Cipher block chaining (CBC)
16b cleartxt
16b ciphertxt
AES enck
16b cleartxt
16b ciphertxt
AES enck
IV
@mxsashsasha@mxsasha.eu
BLOCK CIPHER MODE
Cipher block chaining (CBC)
16b cleartxt
16b ciphertxt
AES enck
16b cleartxt
16b ciphertxt
AES enck
IV
@mxsashsasha@mxsasha.eu
BLOCK CIPHER MODE
Counter mode (CTR)
nonce + 000002
16b ciphertxt
AES enck
nonce + 000001
16b ciphertxt
AES enck
@mxsashsasha@mxsasha.eu
BLOCK CIPHER MODE
Counter mode (CTR)
nonce + 000002
16b ciphertxt
AES enck
nonce + 000001
16b ciphertxt
AES enck
16B
plain
@mxsashsasha@mxsasha.eu
BLOCK CIPHER MODE
Counter mode (CTR)
nonce + 000002
16b ciphertxt
AES enck
nonce + 000001
16b ciphertxt
AES enck
16B
plain
16B
plain
http://imgur.com/a/6nIWB#1
@mxsashsasha@mxsasha.eu
@mxsashsasha@mxsasha.eu
>>> from Crypto.Cipher import AES
@mxsashsasha@mxsasha.eu
>>> from Crypto.Cipher import AES
>>> cleartext = 'PURPLE CROCODILE’
>>> key = os.urandom(16)
@mxsashsasha@mxsasha.eu
>>> from Crypto.Cipher import AES
>>> cleartext = 'PURPLE CROCODILE’
>>> key = os.urandom(16)
>>> ciphertext = AES.new(key, AES.MODE_ECB)
.encrypt(cleartext)
>>> ciphertext
b'Dx1cDx8e4x1fx8d(xbdxf9yxabx94x14x02xf2'
@mxsashsasha@mxsasha.eu
>>> from Crypto.Cipher import AES
>>> cleartext = 'PURPLE CROCODILE’
>>> key = os.urandom(16)
>>> ciphertext = AES.new(key, AES.MODE_ECB)
.encrypt(cleartext)
>>> ciphertext
b'Dx1cDx8e4x1fx8d(xbdxf9yxabx94x14x02xf2'
>>> AES.new(key, AES.MODE_ECB)
.decrypt(ciphertext)
b'PURPLE CROCODILE’
@mxsashsasha@mxsasha.eu
>>> from Crypto.Cipher import AES
>>> cleartext = 'PURPLE CROCODILE’
>>> key = os.urandom(16)
>>> ciphertext = AES.new(key, AES.MODE_ECB)
.encrypt(cleartext)
>>> ciphertext
b'Dx1cDx8e4x1fx8d(xbdxf9yxabx94x14x02xf2'
>>> AES.new(key, AES.MODE_ECB)
.decrypt(ciphertext)
b'PURPLE CROCODILE’
>>> AES.new('xxxxxxxxxxxxxxxx', AES.MODE_ECB)
.decrypt(ciphertext)
b"C_@x0ed#x07xffxb50x19xd4'(3xcf"
@mxsashsasha@mxsasha.eu
CBC DECRYPTION
16b cleartxt
16b ciphertxt
AES deck
16b cleartxt
16b ciphertxt
AES deck
@mxsashsasha@mxsasha.eu
CBC DECRYPTION
16b cleartxt
16b ciphertxt
AES deck
16b cleartxt
16b ciphertxt
AES deck
0→1
@mxsashsasha@mxsasha.eu
CBC DECRYPTION
16b cleartxt
16b ciphertxt
AES deck
16b cleartxt
16b ciphertxt
AES deck
0→1
<garbage>
@mxsashsasha@mxsasha.eu
CBC DECRYPTION
16b cleartxt
16b ciphertxt
AES deck
16b cleartxt
16b ciphertxt
AES deck
0→1
0→1
<garbage>
@mxsashsasha@mxsasha.eu
Hashing and
authentication
@mxsashsasha@mxsasha.eu
CRYPTOGRAPHIC HASHING
purple SHA-2
65e41a235a7fabc751a4dbdea081
810e203ae323f703451c423c1ede
purplf SHA-2
7c2da082cb27371197eeea108675
4250eb4742c63bff8fbad6a53332
purpl SHA-2
01ef04256fd0f350158f0f84f4e1
a5d1df29ebebf26dc5a1f53413f5
@mxsashsasha@mxsasha.eu
GOOD CRYPTOGRAPHIC HASHES
Hash calculation is fast and

requires few resources***1
@mxsashsasha@mxsasha.eu
GOOD CRYPTOGRAPHIC HASHES
2
Unfeasible to calculate the original input
based on the hash
Hash calculation is fast and

requires few resources***1
@mxsashsasha@mxsasha.eu
GOOD CRYPTOGRAPHIC HASHES
2
Small changes in input lead to large
changes in hash output3
Unfeasible to calculate the original input
based on the hash
Hash calculation is fast and

requires few resources***1
@mxsashsasha@mxsasha.eu
GOOD CRYPTOGRAPHIC HASHES
2
Small changes in input lead to large
changes in hash output3
Same input always leads

to same hash4
Unfeasible to calculate the original input
based on the hash
Hash calculation is fast and

requires few resources***1
@mxsashsasha@mxsasha.eu
GOOD CRYPTOGRAPHIC HASHES
2
Small changes in input lead to large
changes in hash output3
Same input always leads

to same hash4
Unfeasible to calculate the original input
based on the hash
Hash calculation is fast and

requires few resources***1
Unfeasible to find two messages
with the same hash (collisions)5
@mxsashsasha@mxsasha.eu
USELESS HASHING
cleartext
cipher
text
AES-CBC
enc
k
SHA-2
message
IV
@mxsashsasha@mxsasha.eu
HMAC
cleartext
cipher
text
AES-CBC
enc
k
HMAC-
SHA-2
message
IV k
@mxsashsasha@mxsasha.eu
Galois-Counter mode (GCM)
@mxsashsasha@mxsasha.eu
Symmetric
ciphers:
Same key for
encrypt and decrypt
@mxsashsasha@mxsasha.eu
Asymmetric
ciphers:
Different key for
encrypt and decrypt
@mxsashsasha@mxsasha.eu
RSA EXAMPLE
cleartext
Claire
Alice
@mxsashsasha@mxsasha.eu
RSA EXAMPLE
RSA
encrypt
cleartext
Claire
Alice
@mxsashsasha@mxsasha.eu
RSA EXAMPLE
RSA
encrypt
Alice’s
public key
cleartext
Claire
Alice
@mxsashsasha@mxsasha.eu
RSA EXAMPLE
RSA
encrypt
RSA
decrypt
Alice’s
public key
cleartext
Claire
Alice
@mxsashsasha@mxsasha.eu
RSA EXAMPLE
RSA
encrypt
RSA
decrypt
Alice’s
public key
Alice’s
private key
cleartext
Claire
Alice
@mxsashsasha@mxsasha.eu
RSA EXAMPLE
RSA
encrypt
RSA
decrypt
Alice’s
public key
Alice’s
private key
cleartext
Claire
Alice
cleartext
@mxsashsasha@mxsasha.eu
NAIVE KEY EXCHANGE
RSA
encrypt
RSA
decrypt
Alice’s
public key
Alice’s
private key
symmetric key
Claire
Alice
symmetric key
AES
@mxsashsasha@mxsasha.eu
NAIVE KEY EXCHANGE
RSA
encrypt
RSA
decrypt
Alice’s
public key
Alice’s
private key
symmetric key
Claire
Alice
symmetric key
AES
@mxsashsasha@mxsasha.eu
NAIVE KEY EXCHANGE
RSA
encrypt
RSA
decrypt
Alice’s
public key
Alice’s
private key
symmetric key
Claire
Alice
symmetric key
AES
@mxsashsasha@mxsasha.eu
DH KEY EXCHANGE
Diffie-
Hellman
Alice pub
Claire
Claire prv
65e41a
235a7…
Diffie-
Hellman
Claire pub
Alice
Alice prv
65e41a
235a7…
random
random
@mxsashsasha@mxsasha.eu
DH:
same parameters
EDH/DHE:

different parameters (ephemeral)
@mxsashsasha@mxsasha.eu
Elliptic curve
cryptography
(e.g. ECDHE)
@mxsashsasha@mxsasha.eu
Trust
@mxsashsasha@mxsasha.eu
MITM SENSITIVITY
Alice
Claire Alice
@mxsashsasha@mxsasha.eu
MITM SENSITIVITY
Alice
Claire Alice
Alice
@mxsashsasha@mxsasha.eu
MITM SENSITIVITY
RSA
encrypt
Alice
Claire Alice
Alice
msg
encrypted
for Alice
@mxsashsasha@mxsasha.eu
MITM SENSITIVITY
RSA
encrypt
Alice
Claire Alice
Alice
msg
encrypted
for Alice
msg
encrypted
for Alice
@mxsashsasha@mxsasha.eu
MITM
Alice
Claire AliceEmmy
@mxsashsasha@mxsasha.eu
MITM
Alice
Claire Alice
Alice
Emmy
@mxsashsasha@mxsasha.eu
MITM
Alice
Claire Alice
Alice
Emmy
Emmy
@mxsashsasha@mxsasha.eu
MITM
Alice
Claire Alice
Emmy Alice
Emmy
Emmy
@mxsashsasha@mxsasha.eu
MITM
RSA
encrypt
Alice
Claire Alice
Emmy Alice
Emmy
msg
encrypted
for Emmy
Emmy
@mxsashsasha@mxsasha.eu
MITM
RSA
encrypt
Alice
Claire Alice
Emmy Alice
Emmy
msg
encrypted
for Emmy
decrypt and
re-encrypt
for Alice
Emmy
@mxsashsasha@mxsasha.eu
MITM
RSA
encrypt
Alice
Claire Alice
Emmy
msg
encrypted
for Alice
Alice
Emmy
msg
encrypted
for Emmy
decrypt and
re-encrypt
for Alice
Emmy
@mxsashsasha@mxsasha.eu
RSA SIGNATURES
RSA sign
Certificate Authority
privkey
pubkey

mxsasha.eu cert
mxsasha.eu
@mxsashsasha@mxsasha.eu
CERTIFICATE CHAIN
mxsasha.euLet’s Encrypt
Authority X3
DST root
CA X3
(Public Key Infrastructure / PKI)
signedsignedtrusts
@mxsashsasha@mxsasha.eu
SSL
TLS
@mxsashsasha@mxsasha.eu
SSL/TLS HISTORY
SSLv1: never published
SSLv2: 1994, awful
SSLv3: 1995, complete new design, obsolete
TLS 1.0: 1999, minor differences
TLS 1.1: 2006, hardening
TLS 1.2: 2008, authenticated encryption

and extensions
TLS 1.3: 2018, mandatory FS & authenticated
encryption, and other security hardening
@mxsashsasha@mxsasha.eu
TLS CIPHER SUITES
TLS_RSA_WITH_AES_128_CBC_SHA
TLS
RSA key exchange (shared secret
exchange)
RSA authentication
AES-128 encryption in CBC mode
SHA1 MAC
@mxsashsasha@mxsasha.eu
TLS CIPHER SUITES
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS
Elliptic curve ephemeral Diffie-
Hellman key exchange (FS!)
RSA authentication
AES-128 encryption in GCM mode
SHA256 PRF
@mxsashsasha@mxsasha.eu
TLS CIPHER SUITES
TLS_DH_ANON_EXPORT_WITH_RC4_40_MD5
TLS
Diffie-Hellman key exchange (no FS!)
No authentication
RC4 encryption with 40 bits
MD5 MAC
@mxsashsasha@mxsasha.eu
What you
should use
@mxsashsasha@mxsasha.eu
TLS CONFIGURATION
https://www.ssllabs.com/ssltest/
@mxsashsasha@mxsasha.eu
SYMMETRIC CRYPTO IN YOUR CODE
https://github.com/fernet/

https://cryptography.io/en/latest/fernet/
AES-256-GCM + argon2id/bcrypt/scrypt/pbkdf2
or
@mxsashsasha@mxsasha.eu
ASYMMETRIC CRYPTO IN YOUR CODE
???????????
or
@mxsashsasha@mxsasha.eu
COMMON ERRORS
Failure to consider wide range of threats,
and/or recovery options1
@mxsashsasha@mxsasha.eu
COMMON ERRORS
2
Failure to authenticate (no MAC, MAC not
checked, certificate chain not checked)
Failure to consider wide range of threats,
and/or recovery options1
@mxsashsasha@mxsasha.eu
COMMON ERRORS
2
Confusing authentication and
confidentiality3
Failure to authenticate (no MAC, MAC not
checked, certificate chain not checked)
Failure to consider wide range of threats,
and/or recovery options1
@mxsashsasha@mxsasha.eu
COMMON ERRORS
2
Confusing authentication and
confidentiality3
Improper key handling (no KDF, key
not stored securely)4
Failure to authenticate (no MAC, MAC not
checked, certificate chain not checked)
Failure to consider wide range of threats,
and/or recovery options1
@mxsashsasha@mxsasha.eu
COMMON ERRORS
2
Confusing authentication and
confidentiality3
Improper key handling (no KDF, key
not stored securely)4
Failure to authenticate (no MAC, MAC not
checked, certificate chain not checked)
Failure to consider wide range of threats,
and/or recovery options1
Side channel vulnerabilities

(timing, errors, compression)5
@mxsashsasha@mxsasha.eu
CRYPTO CHALLENGES
https://cryptopals.com/
Thank you :)
C RY P T O PA L S . C O M
C RY P T O G R A P H Y. I O
S S L L A B S . C O M / S S LT E S T
“ B U L L E T P R O O F S S L A N D T L S ”
S A S H A R O M I J N
S A S H A @ M X S A S H A . E U
@ M X S A S H

More Related Content

What's hot

Cryptography Attacks and Applications
Cryptography Attacks and ApplicationsCryptography Attacks and Applications
Cryptography Attacks and Applications
UTD Computer Security Group
 
Asssignment2
Asssignment2 Asssignment2
Asssignment2
AnnamalikAnnamalik
 
Public Key Algorithms
Public Key AlgorithmsPublic Key Algorithms
Public Key Algorithms
Bit Hacker
 
Broadcasting and low exponent rsa attack
Broadcasting and low exponent rsa attackBroadcasting and low exponent rsa attack
Broadcasting and low exponent rsa attack
Ankita Kapratwar
 
Implementing Software Machines in Go and C
Implementing Software Machines in Go and CImplementing Software Machines in Go and C
Implementing Software Machines in Go and C
Eleanor McHugh
 
Implementing Software Machines in C and Go
Implementing Software Machines in C and GoImplementing Software Machines in C and Go
Implementing Software Machines in C and Go
Eleanor McHugh
 
(Crypto) DES And RSA Algorithms Overview
(Crypto) DES And RSA Algorithms Overview(Crypto) DES And RSA Algorithms Overview
(Crypto) DES And RSA Algorithms Overview
EL Bachir Nouni
 
System Calls
System CallsSystem Calls
System Calls
David Evans
 
Intro to Cryptography on the Web
Intro to Cryptography on the WebIntro to Cryptography on the Web
Intro to Cryptography on the Web
Michael Wynholds
 
Torturing the PHP interpreter
Torturing the PHP interpreterTorturing the PHP interpreter
Torturing the PHP interpreter
Logicaltrust pl
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
Komal Singh
 
An Analysis of Secure Remote Password (SRP)
An Analysis of Secure Remote Password (SRP)An Analysis of Secure Remote Password (SRP)
An Analysis of Secure Remote Password (SRP)
Dharmalingam Ganesan
 
RSA without Integrity Checks
RSA without Integrity ChecksRSA without Integrity Checks
RSA without Integrity Checks
Dharmalingam Ganesan
 

What's hot (13)

Cryptography Attacks and Applications
Cryptography Attacks and ApplicationsCryptography Attacks and Applications
Cryptography Attacks and Applications
 
Asssignment2
Asssignment2 Asssignment2
Asssignment2
 
Public Key Algorithms
Public Key AlgorithmsPublic Key Algorithms
Public Key Algorithms
 
Broadcasting and low exponent rsa attack
Broadcasting and low exponent rsa attackBroadcasting and low exponent rsa attack
Broadcasting and low exponent rsa attack
 
Implementing Software Machines in Go and C
Implementing Software Machines in Go and CImplementing Software Machines in Go and C
Implementing Software Machines in Go and C
 
Implementing Software Machines in C and Go
Implementing Software Machines in C and GoImplementing Software Machines in C and Go
Implementing Software Machines in C and Go
 
(Crypto) DES And RSA Algorithms Overview
(Crypto) DES And RSA Algorithms Overview(Crypto) DES And RSA Algorithms Overview
(Crypto) DES And RSA Algorithms Overview
 
System Calls
System CallsSystem Calls
System Calls
 
Intro to Cryptography on the Web
Intro to Cryptography on the WebIntro to Cryptography on the Web
Intro to Cryptography on the Web
 
Torturing the PHP interpreter
Torturing the PHP interpreterTorturing the PHP interpreter
Torturing the PHP interpreter
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
An Analysis of Secure Remote Password (SRP)
An Analysis of Secure Remote Password (SRP)An Analysis of Secure Remote Password (SRP)
An Analysis of Secure Remote Password (SRP)
 
RSA without Integrity Checks
RSA without Integrity ChecksRSA without Integrity Checks
RSA without Integrity Checks
 

Similar to Sasha Romijn - Everything I always wanted to know about crypto, but never thought I'd understand - Codemotion Berlin 2018

6-PKCpartII-Encryptionandsignatures.pptx
6-PKCpartII-Encryptionandsignatures.pptx6-PKCpartII-Encryptionandsignatures.pptx
6-PKCpartII-Encryptionandsignatures.pptx
farouqalfuhidi
 
Chapter 06 rsa cryptosystem
Chapter 06   rsa cryptosystemChapter 06   rsa cryptosystem
Chapter 06 rsa cryptosystem
Ankur Choudhary
 
Kleptography
KleptographyKleptography
Kleptography
Erfan Mallick
 
Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...
FahmiOlayah
 
Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2
AfiqEfendy Zaen
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
ijsrd.com
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
Nagendra Um
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
Dr. Rupa Ch
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
rameshvvv
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
thai
 
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docxHW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
wellesleyterresa
 
RSA Algorithm.ppt
RSA Algorithm.pptRSA Algorithm.ppt
RSA Algorithm.ppt
ArchanaT30
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSA
Mohamed Loey
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
Siva Rushi
 
Deep dive into rsa
Deep dive into rsaDeep dive into rsa
Deep dive into rsa
Bill GU
 
Best C++ Programming Homework Help
Best C++ Programming Homework HelpBest C++ Programming Homework Help
Best C++ Programming Homework Help
C++ Homework Help
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Swati Nagpal
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
Mohd Arif
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2
Fahad Layth
 

Similar to Sasha Romijn - Everything I always wanted to know about crypto, but never thought I'd understand - Codemotion Berlin 2018 (20)

6-PKCpartII-Encryptionandsignatures.pptx
6-PKCpartII-Encryptionandsignatures.pptx6-PKCpartII-Encryptionandsignatures.pptx
6-PKCpartII-Encryptionandsignatures.pptx
 
Chapter 06 rsa cryptosystem
Chapter 06   rsa cryptosystemChapter 06   rsa cryptosystem
Chapter 06 rsa cryptosystem
 
Kleptography
KleptographyKleptography
Kleptography
 
Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...
 
Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2Secure Encyrption Systems Chapter 2
Secure Encyrption Systems Chapter 2
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docxHW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
 
RSA Algorithm.ppt
RSA Algorithm.pptRSA Algorithm.ppt
RSA Algorithm.ppt
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSA
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
Deep dive into rsa
Deep dive into rsaDeep dive into rsa
Deep dive into rsa
 
Best C++ Programming Homework Help
Best C++ Programming Homework HelpBest C++ Programming Homework Help
Best C++ Programming Homework Help
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2
 

More from Codemotion

Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Codemotion
 
Pompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending storyPompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending story
Codemotion
 
Pastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storiaPastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storia
Codemotion
 
Pennisi - Essere Richard Altwasser
Pennisi - Essere Richard AltwasserPennisi - Essere Richard Altwasser
Pennisi - Essere Richard Altwasser
Codemotion
 
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Codemotion
 
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Codemotion
 
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Codemotion
 
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 - Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Codemotion
 
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Codemotion
 
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Codemotion
 
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Codemotion
 
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Codemotion
 
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Codemotion
 
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Codemotion
 
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Codemotion
 
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
Codemotion
 
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Codemotion
 
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Codemotion
 
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Codemotion
 
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Codemotion
 

More from Codemotion (20)

Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
 
Pompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending storyPompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending story
 
Pastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storiaPastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storia
 
Pennisi - Essere Richard Altwasser
Pennisi - Essere Richard AltwasserPennisi - Essere Richard Altwasser
Pennisi - Essere Richard Altwasser
 
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
 
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
 
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
 
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 - Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
 
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
 
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
 
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
 
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
 
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
 
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
 
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
 
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
 
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
 
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
 
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
 
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
 

Recently uploaded

What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 

Recently uploaded (20)

What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 

Sasha Romijn - Everything I always wanted to know about crypto, but never thought I'd understand - Codemotion Berlin 2018