Artwork

A tartalmat a Maitt Saiwyer biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Maitt Saiwyer vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.
Player FM - Podcast alkalmazás
Lépjen offline állapotba az Player FM alkalmazással!

Episode 6 - Defensive Crypto Decoded

31:54
 
Megosztás
 

Manage episode 513142078 series 3695172
A tartalmat a Maitt Saiwyer biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Maitt Saiwyer vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.

This episode focuses on defensive cryptography, moving beyond mere confidentiality to explore the essential safeguards needed for data integrity, key management, and robust system architecture. The session begins by highlighting that encryption alone is insufficient for security; weak historical practices like simple password encryption failed because attackers could easily recover passwords by guessing common words against the encrypted files. Modern credential security relies on key derivation functions (KDFs) like Argon2, which combine a unique salt, a high iteration count, and memory hardness to drastically increase the computational cost and time required for an attacker to run brute-force guessing attacks.

The core of a strong defense is achieving both confidentiality (encryption) and integrity/authenticity (MACs) simultaneously, ideally through the encrypt-then-MAC construction, which immediately verifies the ciphertext integrity before attempting to decrypt, thereby minimizing the information leakage from a tampered message. For key exchange, protocols like Diffie-Hellman (DH) are mathematically elegant for establishing a shared secret, but they are wide open to Man-in-the-Middle (MITM) attacks if not combined with robust authentication, usually via digital signatures. This authentication is crucial to DH's most important security property, forward secrecy, which ensures that the compromise of a long-term key does not retroactively compromise past session keys.

The single greatest threat to digital security is often not a weakness in the cryptographic algorithm itself, but a systemic flaw in the overall architecture, such as the use of high-performance code written in assembly language that bypasses the automated safety checks of modern compilers. This highlights that effective defensive architecture relies on non-cryptographic principles like fine-grained compartmentalization and least privilege, ensuring that each system component only has the minimal permissions necessary for its specific function. Ultimately, the resilience of a secure system does not rest on the theoretical strength of the math alone, but on a continuous, active process of managing complexity, anticipating threats, and applying sound architectural and procedural elements.

  continue reading

21 epizódok

Artwork
iconMegosztás
 
Manage episode 513142078 series 3695172
A tartalmat a Maitt Saiwyer biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Maitt Saiwyer vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.

This episode focuses on defensive cryptography, moving beyond mere confidentiality to explore the essential safeguards needed for data integrity, key management, and robust system architecture. The session begins by highlighting that encryption alone is insufficient for security; weak historical practices like simple password encryption failed because attackers could easily recover passwords by guessing common words against the encrypted files. Modern credential security relies on key derivation functions (KDFs) like Argon2, which combine a unique salt, a high iteration count, and memory hardness to drastically increase the computational cost and time required for an attacker to run brute-force guessing attacks.

The core of a strong defense is achieving both confidentiality (encryption) and integrity/authenticity (MACs) simultaneously, ideally through the encrypt-then-MAC construction, which immediately verifies the ciphertext integrity before attempting to decrypt, thereby minimizing the information leakage from a tampered message. For key exchange, protocols like Diffie-Hellman (DH) are mathematically elegant for establishing a shared secret, but they are wide open to Man-in-the-Middle (MITM) attacks if not combined with robust authentication, usually via digital signatures. This authentication is crucial to DH's most important security property, forward secrecy, which ensures that the compromise of a long-term key does not retroactively compromise past session keys.

The single greatest threat to digital security is often not a weakness in the cryptographic algorithm itself, but a systemic flaw in the overall architecture, such as the use of high-performance code written in assembly language that bypasses the automated safety checks of modern compilers. This highlights that effective defensive architecture relies on non-cryptographic principles like fine-grained compartmentalization and least privilege, ensuring that each system component only has the minimal permissions necessary for its specific function. Ultimately, the resilience of a secure system does not rest on the theoretical strength of the math alone, but on a continuous, active process of managing complexity, anticipating threats, and applying sound architectural and procedural elements.

  continue reading

21 epizódok

Minden epizód

×
 
Loading …

Üdvözlünk a Player FM-nél!

A Player FM lejátszó az internetet böngészi a kiváló minőségű podcastok után, hogy ön élvezhesse azokat. Ez a legjobb podcast-alkalmazás, Androidon, iPhone-on és a weben is működik. Jelentkezzen be az feliratkozások szinkronizálásához az eszközök között.

 

Gyors referencia kézikönyv

Hallgassa ezt a műsort, miközben felfedezi
Lejátszás