Organized by the Moroccan Association of Digital Trust (AMAN) in Marrakech Morocco
Views: 29 Association AMAN
Russ Dietz speaking at the 2012 RSA Conference about the Importance of Cryptography and Key Management. Learn more at: http://www.safenet-inc.com/solutions/data-protection/enterprise-key-management/ http://theworldrunsoncrypto.com/
Views: 13981 Gemalto Security
Authors: Tianhao Wang, Huangyi Ge, Omar Chowdhury, Hemanta K. Maij and Ninghui Li (Purdue University) presented at CCS 2016 - the 23rd ACM Conference on Computer and Communications Security (Hofburg Palace Vienna, Austria / October 24-28, 2016) - organized by SBA Research
Views: 213 CCS 2016
CHIEF SCIENTIST, CRYPTOGRAPHY RESEARCH DIVISION, RAMBUS Can creativity enable us to solve today's hard technical problems? Paul Kocher founded the Cryptography Research Division at Rambus and leads the company as its president and chief scientist. Kocher has gained an international reputation for his research and innovative designs in cryptography. An active contributor to major conferences and leading security initiatives, Kocher has designed numerous cryptographic applications and protocols, which are successfully deployed in real world systems. He was elected to the National Academy of Engineering in 2009, and inducted into the National Cyber Security Hall of Fame in 2014. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at http://ted.com/tedx
Views: 531 TEDx Talks
Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation functions. While learning how to use these components, you will also learn the best practices that drive strong cryptography. This talk won’t make you a cryptography expert but it will give you the knowledge necessary to use cryptography properly. No prior knowledge of cryptography is required for this presentation. EVENT: Dutch PHP Conference in 2018 SPEAKER: Adam Englander PERMISSIONS: Original video was published with the Creative Commons Attribution license (reuse allowed). CREDITS: Original video source: https://www.youtube.com/watch?v=KcjJ19geKmA
Views: 30251 Coding Tech
Quantum Cryptography explained simply. Regular encryption is breakable, but not quantum cryptography. Today we'll look at the simplest case of quantum cryptography, quantum key distribution. It uses the Heisenberg Uncertainty Principle to prevent eavesdroppers from cracking the code. Hi! I'm Jade. Subscribe to Up and Atom for new physics, math and computer science videos every week! *SUBSCRIBE TO UP AND ATOM* https://www.youtube.com/c/upandatom *Let's be friends :)* TWITTER: https://twitter.com/upndatom?lang=en *QUANTUM PLAYLIST* https://www.youtube.com/playlist?list=PL1lNrW4e0G8WmWpW846oE_m92nw3rlOpz *SOURCES* http://gva.noekeon.org/QCandSKD/QCandSKD-introduction.html https://www.sans.org/reading-room/whitepapers/vpns/quantum-encryption-means-perfect-security-986 https://science.howstuffworks.com/science-vs-myth/everyday-myths/quantum-cryptology.htm The Code Book - Simon Singh *MUSIC* Prelude No. 14 by Chris Zabriskie is licensed under a Creative Commons Attribution license (https://creativecommons.org/licenses/by/4.0/) Source: http://chriszabriskie.com/preludes/ Artist: http://chriszabriskie.com/
Views: 20447 Up and Atom
Website: http://chris.blockseed.com/ This project, crypto life is a game which involves cryptology and network security knowledge. Player can pass through a mission and get some awards. The awards include money and experience. Players has to learn some pre-requested skill and collect or buy some tools to go through a mission. Missions are divided into different difficulties level. Missions will be generated randomly from easy to hard. In this game, player has to learn quite a lot of cryptology and network security knowledge and collect some tools such as cryptanalysis tools to go through a mission and earn enough money to improve the computational power. The artificial operating system is used to accept and execute a user command. It is a simulated operating system and let every mission more realistic. This game would also serve as an educational tools since this game will simulate the real situation and every mission will involve some key security issue. The aim of this game is to spread the crisis consciousness of using information system. By the increasing use of computer and network, people should learn the some important security knowledge to prevent from attack. As a result, player is encouraged to think and to fix the security hole and issue, but remembers not to use security knowledge in any illegal action.
Views: 611 Chris Jin
James Lyne is the Director of Technology Strategy at Sophos, a research firm concerned with cyber security. He works with law enforcement and other defense organizations at the forefront of data protection. [Note: We want you to see these talks exactly as they happened! The archive footage might be a little rougher than the usual TED.com talk.]
Views: 37937 TEDTalentSearch
by Ivan Krstic With over a billion active devices and in-depth security protections spanning every layer from silicon to software, Apple works to advance the state of the art in mobile security with every release of iOS. We will discuss three iOS security mechanisms in unprecedented technical detail, offering the first public discussion of one of them new to iOS 10. HomeKit, Auto Unlock and iCloud Keychain are three Apple technologies that handle exceptionally sensitive user data – controlling devices (including locks) in the user's home, the ability to unlock a user's Mac from an Apple Watch, and the user's passwords and credit card information, respectively. We will discuss the cryptographic design and implementation of our novel secure synchronization fabric which moves confidential data between devices without exposing it to Apple, while affording the user the ability to recover data in case of device loss. Data Protection is the cryptographic system protecting user data on all iOS devices. We will discuss the Secure Enclave Processor present in iPhone 5S and later devices and explain how it enabled a new approach to Data Protection key derivation and brute force rate limiting within a small TCB, making no intermediate or derived keys available to the normal Application Processor. Traditional browser-based vulnerabilities are becoming harder to exploit due to increasingly sophisticated mitigation techniques. We will discuss a unique JIT hardening mechanism in iOS 10 that makes the iOS Safari JIT a more difficult target.
Views: 98783 Black Hat
Steve Weis, Software Engineer, Facebook This talk discusses emerging cryptographic technologies including secure enclaves, homomorphic encryption, secure multiparty computation, and functional cryptography. We'll focus on the potential impact to everyday security and privacy. For background, we'll recap trends in cryptographic adoption and how it has affected real world users. We'll cover both positive and negative examples and suggest areas of development most beneficial to the next billion users coming online. We'll then discuss how emerging cryptography may enable new models of computation, while better protecting people's sensitive data. Sign up to find out more about Enigma at https://enigma.usenix.org
Views: 1046 USENIX Enigma Conference
Dr. Ari Juels Chief Scientist, RSA, The Security Division of EMC and Director, RSA Laboratories Panelists: Whitfield Diffie, Vice President for Information Security, ICANN; and Chief Cryptographer, Revere Security; Ronald Rivest, Viterbi Professor of Electrical Engineering and Computer Science, MIT; Stefan Savage, Professor, Department of Computer Science & Engineering, University of California, San Diego; Adi Shamir, Professor, Computer Science Department, Weizmann Institute of Science, Israel. Join the founders and leaders of the field for an engaging discussion about the latest advances in cryptography, research areas to watch in 2012 and practical insights that continue to be drawn from lessons learned over the last three decades. Subscribe to our YouTube Channel http://www.youtube.com/rsaconference Find us on Facebook http://www.facebook.com/rsaconference Follow us on Twitter http://www.twitter.com/rsaconference Visit our website at http://www.rsaconference.com/
Views: 4242 RSA Conference
David Holmes, Threat Researcher, F5 Networks Key findings from a multiyear, multinode cryptographic scanning project. We sampled tens of millions of Internet hosts since 2014, including every host in the Alexa and OpenDNS Top 1 million to track cipher selection rates, security headers, and fingerprint TLS stacks and web servers for statistical analysis. This talk will present the findings, the scanner architecture and the release of its source code. Learning Objectives: 1: Explore key findings of adoption rates of significant global SSL/TLS trends. 2: Explore the architecture/challenges of a distributed cryptographic TLS scanner. 3: Obtain source code for distributed cryptographic TLS statistic scanner. https://www.rsaconference.com/videos/secrets-of-the-encrypted-internetworldwide-cryptographic-statistics
Views: 154 RSA Conference
City University London Technical Lecture: The Science of Cyber Security by Professor Chris Hankin, Institute for Security Science and Technology, Imperial College London. To find out more see: http://bit.ly/2Leu9IF Visit our website for more information and follow us for regular updates: Website: http://bit.ly/2IWUfS4 Facebook: http://bit.ly/2s22WRB Twitter: http://bit.ly/2GDZroI Instagram: http://bit.ly/2GFM6fQ LinkedIn: http://bit.ly/2IDik0W
Views: 5766 City, University of London
(more information: http://events.ccc.de/congress/2010/Fahrplan/events/4295.en.html )
Views: 1132 kkkwwwaaakkk
[Recorded Jan 26, 2005] Whitfield Diffie, a key figure in the discovery of public-key cryptography, traces the growth of information security through the 20th century and into the 21st. In the 1970s, the world of information security was transformed by public-key cryptography, the radical revision of cryptographic thinking that allowed people with no prior contact to communicate securely. "Public key" solved security problems born of the revolution in information technology that characterized the 20th century and made Internet commerce possible. Security problems rarely stay solved, however. Continuing growth in computing, networking, and wireless applications have given rise to new security problems that are already confronting us.
Views: 105153 Computer History Museum
MODERATOR: Dr. Ari Juels, Chief Scientist, RSA, The Security Division of EMC, and Director, RSA Laboratories PANELISTS: Whitfield Diffie, Chief Cryptographer, Revere Security; Dickie George, Technical Director, Information Assurance, NSA; Martin Hellman, Professor Emeritus of Electrical Engineering, Stanford University; Ronald Rivest, Viterbi Professor of Electrical Engineering and Computer Science, MIT; Adi Shamir, Professor, Computer Science Department, Weizmann Institute of Science, Israel Join the founders of the field for an engaging discussion about the latest advances in cryptography, research areas to watch in 2011 and practical insights that continue to be drawn from lessons learned over the last three decades. Subscribe to our YouTube Channel http://www.youtube.com/rsaconference Find us on Facebook http://www.facebook.com/rsaconference Follow us on Twitter http://www.twitter.com/rsaconference Visit our website at http://www.rsaconference.com/
Views: 4069 RSA Conference
This lecture presents an overview of the Snowden revelations and the impact on our understanding of the security of our networks and systems. In particular, we discuss the known ways in which sophisticated attackers can bypass or undermine cryptography. We also speculate on how three-letter agencies could be breaking most encryption on the Internet. We relate this to the latest developments in cryptanalysis and discuss which cryptographic algorithms and implementations to select to stay protected. This lecture was delivered at SecAppDev 2015 in Leuven. Professor Bart Preneel of KU Leuven heads the iMinds COSIC (COmputer Security and Industrial Cryptography) research group. His main research areas are information security and privacy with a focus on cryptographic algorithms and protocols and efficient and secure implementations. He has authored more than 400 scientific publications and is inventor of five patents. He teaches cryptology, network security and discete algebra at the KU Leuven and was visiting professor at the Ruhr Universitaet Bochum (Germany), the T.U.Graz (Austria), the University of Bergen (Norway), DTU (Denmark) and the Universiteit Gent (Belgium). In '93-'94 he was a research fellow at the University of California at Berkeley. He undertakes industrial consulting for major players in the finance, telco and hardware industry and has co-designed the Belgian eID and e-voting scheme. He is active in international standaridzation . Professor Preneel has served as Director, (1997-present), Vice President (2002-2007) and President (2008-2013) of the International Association for Cryptologic Research (IACR) and is co-founder and chairman of LSEC vzw (Leuven Security Excellence Consortium). He is a fellow of the IACR, a member of the Permanent Stakeholders group of ENISA (European Network and Information Security Agency) and of the Academia Europaea. He has testified for the European and Belgian parliament. He has been invited speaker at more than 150 conferences and schools in 40 countries. In 2014 he received the RSA Award for Excellence in the Field of Mathematics.
Views: 530 secappdev.org
Moderator: Zulfikar Ramzan, Chief Technology Officer, RSA Ron Rivest, Institute Professor, MIT Adi Shamir, Professor, Computer Science Department, Weizmann Institute of Science, Israel Whitfield Diffie, Cryptographer and Security Expert, Cryptomathic Paul Kocher, Independent Researcher Moxie Marlinspike, Founder, Signal Despite how sophisticated information security has become, it is still a relatively young discipline. The founders of our field continue to be actively engaged in research and innovation. Join us to hear these luminaries engage in an enlightening discussion on the past, present and future of our industry. https://www.rsaconference.com/events/us18/agenda/sessions/11490-The-Cryptographers%E2%80%99-Panel
Views: 5542 RSA Conference
Recorded: 04/07/2010 CERIAS Security Seminar at Purdue University 60 years of scientific research in cryptography: a reflection Yvo Desmedt, University College London, UK Shannon started the unclassified scientific research in cryptography with hisOctober 1949 paper. First we briefly survey the scientific research incryptography since then. We discuss the strengths and weaknesses of thisresearch, attempting to present a balanced viewpoint.The lecture will also discuss the progress we have not made. We will show thatnot everything in modern cryptography is rosy. Besides above examples, we willalso talk about the discrepancy between the massive number of applications ofcryptography studied by academics and the fact most of these are being viewedas completely irrelevant to the real world. Yvo Desmedt received his Ph.D. (Summa cum Laude) from the University ofLeuven, Belgium (1984). He is presently the Chair of InformationCommunication Technology at University College London, UK and Invited SeniorResearch Scientist at RCIS (AIST), Japan. He is also a courtesy professor atFlorida State University. His interests include cryptography, network securityand computer security. He was program chair of ICITS 2007, co-program chair ofCANS 2005, program chair of PKC 2003, the 2002 ACM Workshop on ScientificAspects of Cyber Terrorism and Crypto '94. He is editor-in-chief of the IETInformation Security, editor of the Journal of Computer Security, ofInformation Processing Letters and of Advances in Mathematics ofCommunications. He has given invited lectures at several conferences andworkshop in 5 different continents. He has authored over 150 refereed papers.He has 139 entries on DBLP. He is ranked as 4th most productive (out of 1817researchers) at the two main research conferences in Cryptology. He is arecipient of the Society of Worldwide Inter-bank Funds Transfer (SWIFT) award. (Visit: www.cerias.purude.edu)
Views: 97 ceriaspurdue
Google Tech Talks December, 19 2007 Topics include: Introduction to Modern Cryptography, Using Cryptography in Practice and at Google, Proofs of Security and Security Definitions and A Special Topic in Cryptography This talk is one in a series hosted by Google University: Wednesdays, 11/28/07 - 12/19/07 from 1-2pm Speaker: Steve Weis Steve Weis received his PhD from the Cryptography and Information Security group at MIT, where he was advised by Ron Rivest. He is a member of Google's Applied Security (AppSec) team and is the technical lead for Google's internal cryptographic library, KeyMaster.
Views: 70137 GoogleTechTalks
Smart Wearables: Are they improving our well-being or enabling discrimination? Smart wearables are increasingly being used by millions of people to improve their well-being. Daily activities as well as vital signs can be sensed and processed to monitor individuals’ health status. There is also a significant chance to improve the overall healthcare system and reduce costs if those devices are also connected to the network of medical institutions. Unfortunately, how such data are collected, stored and processed at the moment are causing serious privacy concerns. For instance, the data collected can be used to identify people performing less physical activities, causing increased premium for insurance. In this talk, we are going to address the privacy concerns with respect to smart wearables and discuss social, technical and legal solutions to eliminate the possible risks of misuse. Zeki Erkin Dr. Erkin is a tenured assistant professor in the Cyber Security Group, Delft University of Technology. He received his PhD degree on "Secure Signal Processing" in 2010 from Delft University of Technology where he has continued his research on Privacy Enhancing Technologies, particularly on Computational Privacy. His interest is on protecting sensitive data from malicious entities and service providers using cryptographic tools. While his interest on solutions based on provably secure cryptographic protocols is the core of his research, Dr. Erkin is also investigating distributed trust for building such protocols without trusted entities. Dr. Erkin has been involved in several European and national projects one of which is on Blockchain and Logistics Innovations where an unbounded scalable blockchain version with confidentiality is being developed. He is serving also in numerous committees including IEEE TIFS, Eurasip SAT on Information Security, is an area editor in Eurasip Journal on Information Security and Elsevier Image processing. Dr. Erkin is a member of TU Delft Blockchain Lab, also serving as a core member of Cyber Security Next Generation, a community of cyber security researchers in the Netherlands.
Views: 313 Studium Generale Delft
url: https://linuxplumbersconf.org/event/2/contributions/66/ speaker: Jason Donenfeld WireGuard   is a new network tunneling mechanism written for Linux, which, after three years of development, is nearly ready for upstream. It uses a formally proven cryptographic protocol, custom tailored for the Linux kernel, and has already seen very widespread deployment, in everything from smart phones to massive data center clusters. WireGuard uses a novel timer mechanism to hide state from userspace, and in general presents userspace with a "stateless" and "declarative" system of establishing secure tunnels. The codebase is also remarkably small and has been written with a number of defense in depth techniques. Integration into the larger Linux ecosystem is advancing at a health rate, with recent patches for systemd and NetworkManager merged. There is also ongoing work into combining WireGuard with automatic configuration and mesh routing daemons on Linux. This talk will focus on a wide variety of WireGuard’s innards and tentacles onto other projects. The presentation will walk through WireGuard's integration into the netdev subsystem, its unique use of network namespaces, why kernel space is necessary is necessary, the various hurdles that have gone into designing a cryptographic protocol specifically with kernel constraints in mind. It will also examine a practical approach to formal verification, suitable for kernel engineers and not just academics, and connect the ideas of that with our extensive continuous integration testing framework across multiple kernel architectures and versions. As if that was not already enough, we will also take a close look at the interesting performance aspects of doing high throughput CPU-bound computations in kernel space while still keeping latency to a minimum. On the topic of smartphones, the talk will examine power efficiency techniques of both the implementation and of the protocol design, our experience in integrating this into Android kernels, and the relationship between cryptographic secrets and smartphones suspend cycles. Finally we will look carefully at the WireGuard userspace API and its usage in various daemons and managers. In short, this presentation will examine the networking and cryptography design, the kernel engineering, and the userspace integration considerations of WireGuard.  https://www.wireguard.com  https://www.wireguard.com/papers/wireguard.pdf
Views: 1763 Linux Plumbers Conference
This lecture presents an overview of the Snowden revelations and the impact on our understanding of the security of our networks and systems. In particular, we discuss the known ways in which sophisticated attackers can bypass or undermine cryptography. We also speculate on how three-letter agencies could be breaking most encryption on the Internet. We relate this to the latest developments in cryptanalysis and discuss which cryptographic algorithms and implementations to select to stay protected. Learning objectives + Understand how sophisticated opponents agencies can undermine cryptographic protection + Understand how to maximize your chances to resist sophisticated opponents using cryptographic techniques This lecture was delivered by Bart Preneel at SecAppDev 2016, Leuven, Belgium Professor Bart Preneel of KU Leuven heads the iMinds COSIC (COmputer Security and Industrial Cryptography) research group. His main research areas are information security and privacy with a focus on cryptographic algorithms and protocols and efficient and secure implementations. He has authored more than 400 scientific publications and is inventor of five patents. He teaches cryptology, network security and discete algebra at the KU Leuven and was visiting professor at the Ruhr Universitaet Bochum (Germany), the T.U.Graz (Austria), the University of Bergen (Norway), DTU (Denmark) and the Universiteit Gent (Belgium). In '93-'94 he was a research fellow at the University of California at Berkeley. He undertakes industrial consulting for major players in the finance, telco and hardware industry and has co-designed the Belgian eID and e-voting scheme. He is active in international standaridzation . Professor Preneel has served as Director, (1997-present), Vice President (2002-2007) and President (2008-2013) of the International Association for Cryptologic Research (IACR) and is co-founder and chairman of LSEC vzw (Leuven Security Excellence Consortium). He is a fellow of the IACR, a member of the Permanent Stakeholders group of ENISA (European Network and Information Security Agency) and of the Academia Europaea. He has testified for the European and Belgian parliament. He has been invited speaker at more than 150 conferences and schools in 40 countries. In 2014 he received the RSA Award for Excellence in the Field of Mathematics.
Views: 887 secappdev.org
WE ARE SORRY FOR THE POOR AUDIO IN THIS TALK, THE MIC FAILED AT THE START OF THE TALK LEAVING ONLY THE ONBOARD CAMERA AUDIO - WE HAVE TRIED TO CLEAN IT UP AS BEST WE CAN. In an increasingly hostile world security is becoming more and more important in today’s software design. Increasing regulation also means that security measures are mandated in the design of new software. Many programmers, however, are unfamiliar with security concepts and jargon, and find the learning curve challenging. This talk will give an introduction to cryptographic techniques and an overview of the use of cryptography in software. It is aimed at programmers, not at mathematicians or at cryptographers. The talk will be language-agnostic, but will include some discussion of common cryptographic APIs, which are typically written to be C-callable.
Views: 669 ACCU Conference
If you're a business owner, CEO, or CFO, it might surprise to know that your business's weakest information and cyber security link is your people. This seminar will help you understand how to protect your data and reduce your risk, improve your information security posture, understand how data breaches and scams have become a societal norm, and be aware of the fundamental factor - the human contribution to data breaches.
Views: 769 Redpath and Company
EE380: Computer Systems Colloquium Seminar The Evolution of Public Key Cryptography Speaker: Martin Hellman, Stanford EE (Emeritus) While public key cryptography is seen as revolutionary, after this talk you might wonder why it took Whit Diffie, Ralph Merkle and Hellman so long to discover it. This talk also highlights the contributions of some unsung (or "under-sung") heroes: Ralph Merkle, John Gill, Stephen Pohlig, Richard Schroeppel, Loren Kohnfelder, and researchers at GCHQ (Ellis, Cocks, and Williamson). Resources and Reading Materials M. E. Hellman, Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic (http://www-ee.stanford.edu/ %7Ehellman/publications/77.pdf), Communications of the ACM, Vol. 60, No. 12, pp. 52-59, December 2017. This is a written version of Martin Hellman's ACM Turing Lecture (https://www.youtube.com/watch?v=I132wSwAI3o) and was accompanied by a short (6 minute) video (https://vimeo.com/241030842). Other materials and hard to find references can be found on Martin Hellman's Stanford website, http://www-ee.stanford.edu/~hellman/ . About the Speaker: Martin E. Hellman is Professor Emeritus of Electrical Engineering at Stanford University and is affiliated with the university's Center for International Security and Cooperation (CISAC). His recent technical work has focused on bringing a risk informed framework to a potential failure of nuclear deterrence and then using that approach to find surprising ways to reduce the risk. His earlier work included co- inventing public key cryptography, the technology that underlies the secure portion of the Internet. His many honors include election to the National Academy of Engineering and receiving (jointly with his colleague Whit Diffie) the million dollar ACM Turing Award, the top prize in computer science. His most recent project is a book, jointly written with his wife of fifty years, "A New Map for Relationships: Creating True Love at Home & Peace on the Planet," that provides a "unified field theory" of peace by illuminating the connections between nuclear war, conventional war, interpersonal war, and war within our own psyches. For more information about this seminar and its speaker, you can visit https://ee380.stanford.edu/Abstracts/180307.html Support for the Stanford Colloquium on Computer Systems Seminar Series provided by the Stanford Computer Forum. Colloquium on Computer Systems Seminar Series (EE380) presents the current research in design, implementation, analysis, and use of computer systems. Topics range from integrated circuits to operating systems and programming languages. It is free and open to the public, with new lectures each week. Learn more: http://bit.ly/WinYX5
Views: 1868 stanfordonline