![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
This course explores the failures of secret key cryptography, covering topics such as real attacks, network packets, cryptographic agility, biases, hardware and software optimization, and integrated authentication. The learning outcomes include understanding the vulnerabilities of secret key cryptography and the importance of cryptographic agility. The course is intended for individuals interested in cryptography and cybersecurity. The teaching method is through an invited talk by Daniel Bernstein, providing insights and analysis on the subject matter.
Syllabus
Intro
Is cryptography infeasible
Flame
Whos being attacked
No real attacks
VMware
Browsers
Network packets
Timing
Cryptographic agility
RC4 vs SSL
Biases
First output bank
Why does it not work
Hardware and software optimization
Misuse Resistance
Integrated Authentication
Summary
Competition
Taught by
TheIACR