Crypto Attacks

This is the second in a series of 3 sessions on practical cryptography. In this session we’ll talk about a number of practical attacks you can use on cryptosystems in the real world.

What you’ll learn

  • Stream cipher key reuse
  • ECB block reordering
  • ECB decryption
  • Padding and padding oracles
  • Hash length extension