Black Hat Europe
December 4-7, 2017
London UK
Black Hat Asia
March 20-23, 2018
Singapore
Black Hat USA
August 4-9, 2018
Las Vegas, NV, USA
11/6/2017
12:00 PM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Black Hat Europe 2017:
Deep Dive Into Crypto Vulnerabilities

Thoroughly addressing security concerns requires a combination of technical and social approaches. Using cryptographic techniques to encrypt data through complex algorithms is an essential component of any security program. Understand the role of encryption in security architecture and develop in-demand skills with the following Black Hat Europe 2017 Trainings, Briefings and Arsenal open-source tools.

 

Crypto Attacks and Defenses imparts foundational knowledge in identification and elimination of cryptographic vulnerabilities. In this two day course, students will master the latest challenges and approaches, including elliptic-curve, quantum, post-quantum cryptography and more. Begin with a basic understanding of Python, public-key and secret-key cryptography, leave with profound comprehension of cryptographic software implementations. Gain actionable experience through hands-on training using real-world secure messaging and blockchain systems.

Key Reinstallation Attacks: Breaking the WPA2 Protocol details protocol-level weaknesses in the Wi-Fi Protected Access II (WPA2) security protocol that allow key reinstallation (KRACK) attacks. The protocol-level location fundamentally impacts standard implementations affecting personal and enterprise networks. Researchers share results of tests highlighting multiple unique attack vectors for accessing secure data and compromising connected systems. Every single Wi-Fi device is susceptible to this form of attack.

Fed Up Getting Shattered and Log Jammed? A New Generation of Crypto is Coming explores modern algorithms and standardized functions derived out of them. Researchers also introduce two cryptographic protocols created out of SHA-3: Strobe, a symmetric traffic protection protocol and Disco, a TLS like protocol and library. SHA-3 lends its core cryptographic functionalities, including simplifying logic, reducing code size and increasing capabilities (hashing, generating random numbers, deriving keys, and more).

By-design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms dissects the BEA-1, block cipher algorithm made public in 2017. Similar to the AES, BEA-1 contains a mathematical backdoor enabling an operational and effective cryptanalysis. Mathematical backdoors can be completely public yet remain inaccessible and challenging. Hear how BEA-1 was developed and learn new concepts for designing complex, undetectable backdoors.

Thalos - Simple and Secure Approach to Storage in Untrusted Environments encrypts files and prohibits decryption regardless of physical or virtual server access. Files are protected by unique cryptographic algorithms yet accessible on multiple devices. A master key and public key create a Master Key Pair which encrypts the user basefile. See a live demonstration at Black Hat Europe 2017 Arsenal on Wednesday, December 6.

Enhance your cryptography skills and more at Black Hat Europe, held at ExCeL London, December 4-7, 2017.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
BlueBorne Attack Highlights Flaws in Linux, IoT Security
Kelly Sheridan, Associate Editor, Dark Reading,  12/14/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.