A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Crypto-Exploit Exercises: A tool for reinforcing basic topics in Cryptography - Nancy Snoke Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos)

Crypto-Exploit Exercises: A tool for reinforcing basic topics in Cryptography - Nancy Snoke
Derbycon 2013

Description: The crypto-exploit exercises virtual machine (VM) is a learning tool that teaches concepts via giving the user a chance to solve actual problems. A virtual machine has been set up with nine different cryptographic problems. The topics covered in crypto exploit exercises include simple ciphers, weak encryption schemes, weak key choices, one time pad encryption, in-sync encryption, secret sharing, public key encryption, CPA-security and CCA-security. This talk will give a short introduction to cryptographic concepts, and then introduce the Crypto-Exploit exercises VM and how to use it.

Bio: Nancy Snoke is a software engineer with Cisco Systems with a focus on security. She has degrees in Computer Engineering and Physics from Tulane University, and has a Masters in Computer Science from the University of Illinois Urbana-Champaign. She has been a professional software engineer for 8 years, and has always loved security.

Back to Derbycon 2013 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast