{"id":10428,"date":"2023-01-31T06:18:46","date_gmt":"2023-01-31T06:18:46","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/"},"modified":"2023-07-05T10:07:29","modified_gmt":"2023-07-05T10:07:29","slug":"hacking-cryptography-hitb2023ams","status":"publish","type":"product","link":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/","title":{"rendered":"Hacking Cryptography"},"content":{"rendered":"<div class=\"page\" title=\"Page 3\">\n<h2><strong><span style=\"color: #993300;\">REGISTRATION CLOSED<\/span><\/strong><\/h2>\n<h4><strong>DATE: 17-19 April 2023<\/strong><\/h4>\n<\/div>\n<h4><strong>TIME: 09:00 to 17:00 CEST\/GMT+2<\/strong><\/h4>\n<table style=\"height: 146px;\" width=\"599\">\n<tbody>\n<tr>\n<td><strong>Date<\/strong><\/td>\n<td><strong>Day<\/strong><\/td>\n<td style=\"text-align: left;\"><strong>Time<\/strong><\/td>\n<td><strong>Duration<\/strong><\/td>\n<\/tr>\n<tr>\n<td>17 Apr<\/td>\n<td>Monday<\/td>\n<td>0900-17:00 CEST\/GMT+2<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>18 Apr<\/td>\n<td>Tuesday<\/td>\n<td>0900-17:00 CEST\/GMT+2<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>19 Apr<\/td>\n<td>Wednesday<\/td>\n<td>0900-17:00 CEST\/GMT+2<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<h5>Virtually all digital communication is secured using cryptography. Our laptops, phones, printers, cars, bank cards and washing machines use cryptography to keep things confidential, to make sure messages aren&#8217;t tampered with and to establish secure connections. However, even though modern security heavily relies on it, cryptography is complex and oftentimes fragile. This in-depth training shows how cryptography is misused in practice. Moreover, participants will learn how common cryptography screwups can be exploited. To foster skills, participants will write their own exploits and use them on real world systems provided by us.<\/h5>\n<h5><strong>Agenda<\/strong><\/h5>\n<h5><strong>Day 1:<\/strong><\/h5>\n<p><strong>Basic Terminology<\/strong><\/p>\n<ul>\n<li>Cryptography<\/li>\n<li>Primitives<\/li>\n<li>Security Guarantees<\/li>\n<li>&#8220;Oracles&#8221;<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Python<\/strong><\/p>\n<ul>\n<li>Basics of Python<\/li>\n<li>Using Python on Raw Bits and Bytes<\/li>\n<li>Using Python for Bignum Computation<\/li>\n<li>**Challenge Lab: Python**<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Attacks on Symmetric Crypto<\/strong><\/p>\n<p><em>Stream Ciphers<\/em><\/p>\n<ul>\n<li>Introduction to Stream Ciphers<\/li>\n<li>The One Time Pad and XOR Ciphers<\/li>\n<li>Salsa20\/Chacha, RC4<\/li>\n<li>Exploiting Output Bias<\/li>\n<li>Leveraging Partialy Known Plaintext<\/li>\n<li>Nonce Reuse Attacks<\/li>\n<li>(Compression) Side Channels<\/li>\n<li>**Challenge Lab: Hacking Stream Ciphers**<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em>Block Ciphers<\/em><\/p>\n<ul>\n<li>Introduction to Block Ciphers<\/li>\n<li>AES, DES, 3DES<\/li>\n<li>Modes of Operation (ECB, CBC, CTR, XTS)<\/li>\n<li>Block Shuffling Attacks<\/li>\n<li>Nonce Reuse Attacks<\/li>\n<li>Bit-Flipping Attacks<\/li>\n<li>Padding Oracles<\/li>\n<li>**Challenge Lab: Hacking Block Ciphers**<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Hash Functions<\/strong><\/p>\n<ul>\n<li>Introduction to Hash Functions<\/li>\n<li>Collision Attacks (SHA1\/MD5)<\/li>\n<li>Length Extension Attacks<\/li>\n<li>Rainbow Table Attacks<\/li>\n<li>**Challenge Lab: Hacking Hash Functions**<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Day 2:<\/strong><\/h5>\n<p><strong>Attacks on Message Authentication Codes<\/strong><\/p>\n<ul>\n<li>Introduction to Message Authentication Codes<\/li>\n<li>Attacks on Primitive Constructs<\/li>\n<li>Forgery Attacks<\/li>\n<li>Authenticated Encryption<\/li>\n<li>GCM Forbidden Attack<\/li>\n<li>**Challenge Lab: Hacking MACs**<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Entropy Attacks<\/strong><\/p>\n<ul>\n<li>Introduction to the Linux Entropy Pool<\/li>\n<li>Misuse of Pseudo Random Number Generators<\/li>\n<li>Predicting Linear Congruential Generators<\/li>\n<li>Predicting Mersenne Twister<\/li>\n<li>Predicting Linear Feedback Shift Registers<\/li>\n<li>The Dual EC DRBG Backdoor<\/li>\n<li>**Challenge Lab: Hacking Randomness**<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Attacks on Asymmetric Crypto \/ RSA<\/strong><\/p>\n<ul>\n<li>Introduction to RSA<\/li>\n<li>RSA Key Formats<\/li>\n<li>Attacks on Textbook RSA<\/li>\n<li>Attacks on Short Keys<\/li>\n<li>Forging RSA Signatures<\/li>\n<li>RSA PKCS#1.5 Signatures<br \/>\n* Padding\/Bleichenbacher Attacks on RSA<\/li>\n<li>**Challenge Lab: Hacking RSA**<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5><strong>Day 3:<\/strong><\/h5>\n<p><strong>Attacks on Asymmetric Crypto \/ ECC<\/strong><\/p>\n<ul>\n<li>Introduction to Elliptic Curve Cryptography<\/li>\n<li>The Java ECC Screwup<\/li>\n<li>Exploiting ecDSA Nonce Reuse<\/li>\n<li>Exploiting ed25519 Bad Public Keys<\/li>\n<li>Invalid Point Attacks<\/li>\n<li>**Challenge Lab: Hacking ECC**<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Certificates<\/strong><\/p>\n<ul>\n<li>Introduction to Certificates<\/li>\n<li>x509 structure<\/li>\n<li>Common certificate pitfalls<\/li>\n<li>**Challenge Lab: Working with Certificates**<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Further Attacks<\/strong><\/p>\n<ul>\n<li>JWT Implementation Bugs<\/li>\n<li>TLS Weaknesses<\/li>\n<li>**Challenge Lab: Exploiting JWT**<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Outlook<\/strong><\/p>\n<ul>\n<li>Sneak Peak at Post Quantum Crypto<\/li>\n<\/ul>\n<p><strong><br \/>\nFarewell<\/strong><\/p>\n<ul>\n<li>**Presentation of Take Home Challenges**<\/li>\n<li>Recap &#8211; Cryptography<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>REGISTRATION CLOSED DATE: 17-19 April 2023 TIME: 09:00 to 17:00 CEST\/GMT+2 Date Day Time Duration 17 Apr Monday 0900-17:00 CEST\/GMT+2 8 Hours 18 Apr Tuesday 0900-17:00 CEST\/GMT+2 8 Hours 19 Apr Wednesday 0900-17:00 CEST\/GMT+2 8 Hours Virtually all digital communication is secured using cryptography. Our laptops, phones, printers, cars, bank cards and washing machines use [&hellip;]<\/p>\n","protected":false},"featured_media":10692,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false},"product_cat":[59,55,56],"product_tag":[],"class_list":{"0":"post-10428","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-3-day-training","7":"product_cat-hitb2023ams","8":"product_cat-in-person","10":"first","11":"instock","12":"featured","13":"shipping-taxable","14":"purchasable","15":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hacking Cryptography - HITBSecConf2023 - Amsterdam<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacking Cryptography - HITBSecConf2023 - Amsterdam\" \/>\n<meta property=\"og:description\" content=\"REGISTRATION CLOSED DATE: 17-19 April 2023 TIME: 09:00 to 17:00 CEST\/GMT+2 Date Day Time Duration 17 Apr Monday 0900-17:00 CEST\/GMT+2 8 Hours 18 Apr Tuesday 0900-17:00 CEST\/GMT+2 8 Hours 19 Apr Wednesday 0900-17:00 CEST\/GMT+2 8 Hours Virtually all digital communication is secured using cryptography. Our laptops, phones, printers, cars, bank cards and washing machines use [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2023 - Amsterdam\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-05T10:07:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2023\/01\/Hacking-Cryptography-ruben-product-photo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"540\" \/>\n\t<meta property=\"og:image:height\" content=\"670\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/\",\"name\":\"Hacking Cryptography - HITBSecConf2023 - Amsterdam\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2023\/01\/Hacking-Cryptography-ruben-product-photo.png\",\"datePublished\":\"2023-01-31T06:18:46+00:00\",\"dateModified\":\"2023-07-05T10:07:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2023\/01\/Hacking-Cryptography-ruben-product-photo.png\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2023\/01\/Hacking-Cryptography-ruben-product-photo.png\",\"width\":540,\"height\":670},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hacking Cryptography\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/\",\"name\":\"HITBSecConf2023 - Amsterdam\",\"description\":\"#HITB2021AMS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacking Cryptography - HITBSecConf2023 - Amsterdam","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/","og_locale":"en_US","og_type":"article","og_title":"Hacking Cryptography - HITBSecConf2023 - Amsterdam","og_description":"REGISTRATION CLOSED DATE: 17-19 April 2023 TIME: 09:00 to 17:00 CEST\/GMT+2 Date Day Time Duration 17 Apr Monday 0900-17:00 CEST\/GMT+2 8 Hours 18 Apr Tuesday 0900-17:00 CEST\/GMT+2 8 Hours 19 Apr Wednesday 0900-17:00 CEST\/GMT+2 8 Hours Virtually all digital communication is secured using cryptography. Our laptops, phones, printers, cars, bank cards and washing machines use [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/","og_site_name":"HITBSecConf2023 - Amsterdam","article_modified_time":"2023-07-05T10:07:29+00:00","og_image":[{"width":540,"height":670,"url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2023\/01\/Hacking-Cryptography-ruben-product-photo.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/","name":"Hacking Cryptography - HITBSecConf2023 - Amsterdam","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2023\/01\/Hacking-Cryptography-ruben-product-photo.png","datePublished":"2023-01-31T06:18:46+00:00","dateModified":"2023-07-05T10:07:29+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2023\/01\/Hacking-Cryptography-ruben-product-photo.png","contentUrl":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2023\/01\/Hacking-Cryptography-ruben-product-photo.png","width":540,"height":670},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hacking-cryptography-hitb2023ams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/"},{"@type":"ListItem","position":2,"name":"Products","item":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/shop\/"},{"@type":"ListItem","position":3,"name":"Hacking Cryptography"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/","name":"HITBSecConf2023 - Amsterdam","description":"#HITB2021AMS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product\/10428"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/comments?post=10428"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/media\/10692"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/media?parent=10428"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product_cat?post=10428"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product_tag?post=10428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}