Description: "In this talk, I will explain and demonstrate how to break cryptography-secured solutions in practice, even if they rely on seemingly strong algorithms and protocols. Several examples in real-life open-source products/protocols will be discussed. This talk will show active crypto attacks with live demonstrations."
Tags: securitytube , swisscyberstorm , hacking , hackers , information security , convention , computer security , cyber storm 11 , swisscyberstorm 11 , swisscyberstorm-2011 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.