Black Hat Asia
March 26-29, 2019
Singapore
Black Hat USA
August 3-8, 2019
Las Vegas, NV, USA
Black Hat Europe
December 3-6, 2019
London UK
11/6/2017
12:00 PM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Black Hat Europe 2017:
Deep Dive Into Crypto Vulnerabilities

Thoroughly addressing security concerns requires a combination of technical and social approaches. Using cryptographic techniques to encrypt data through complex algorithms is an essential component of any security program. Understand the role of encryption in security architecture and develop in-demand skills with the following Black Hat Europe 2017 Trainings, Briefings and Arsenal open-source tools.

 

Crypto Attacks and Defenses imparts foundational knowledge in identification and elimination of cryptographic vulnerabilities. In this two day course, students will master the latest challenges and approaches, including elliptic-curve, quantum, post-quantum cryptography and more. Begin with a basic understanding of Python, public-key and secret-key cryptography, leave with profound comprehension of cryptographic software implementations. Gain actionable experience through hands-on training using real-world secure messaging and blockchain systems.

Key Reinstallation Attacks: Breaking the WPA2 Protocol details protocol-level weaknesses in the Wi-Fi Protected Access II (WPA2) security protocol that allow key reinstallation (KRACK) attacks. The protocol-level location fundamentally impacts standard implementations affecting personal and enterprise networks. Researchers share results of tests highlighting multiple unique attack vectors for accessing secure data and compromising connected systems. Every single Wi-Fi device is susceptible to this form of attack.

Fed Up Getting Shattered and Log Jammed? A New Generation of Crypto is Coming explores modern algorithms and standardized functions derived out of them. Researchers also introduce two cryptographic protocols created out of SHA-3: Strobe, a symmetric traffic protection protocol and Disco, a TLS like protocol and library. SHA-3 lends its core cryptographic functionalities, including simplifying logic, reducing code size and increasing capabilities (hashing, generating random numbers, deriving keys, and more).

By-design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms dissects the BEA-1, block cipher algorithm made public in 2017. Similar to the AES, BEA-1 contains a mathematical backdoor enabling an operational and effective cryptanalysis. Mathematical backdoors can be completely public yet remain inaccessible and challenging. Hear how BEA-1 was developed and learn new concepts for designing complex, undetectable backdoors.

Thalos - Simple and Secure Approach to Storage in Untrusted Environments encrypts files and prohibits decryption regardless of physical or virtual server access. Files are protected by unique cryptographic algorithms yet accessible on multiple devices. A master key and public key create a Master Key Pair which encrypts the user basefile. See a live demonstration at Black Hat Europe 2017 Arsenal on Wednesday, December 6.

Enhance your cryptography skills and more at Black Hat Europe, held at ExCeL London, December 4-7, 2017.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Government Shutdown Brings Certificate Lapse Woes
Curtis Franklin Jr., Senior Editor at Dark Reading,  1/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3906
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 contains hardcoded credentials in the WCF service on port 9003. An authenticated remote attacker can use these credentials to access the badge system database and modify its contents.
CVE-2019-3907
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores user credentials and other sensitive information with a known weak encryption method (MD5 hash of a salt and password).
CVE-2019-3908
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores backup files as encrypted zip files. The password to the zip is hard-coded and unchangeable. An attacker with access to these backups can decrypt them and obtain sensitive data.
CVE-2019-3909
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 database uses default credentials. Users are unable to change the credentials without vendor intervention.
CVE-2019-3910
PUBLISHED: 2019-01-18
Crestron AM-100 before firmware version 1.6.0.2 contains an authentication bypass in the web interface's return.cgi script. Unauthenticated remote users can use the bypass to access some administrator functionality such as configuring update sources and rebooting the device.