The art of Kleptography: Practical backdoor hiding techniques in Public Key Cryptosystems [HITB+ CYBERWEEK 2021]

$2,299.00

Duration

2 days

Delivery Method

hybrid

Level

professional

Seats Available

20

Duration

2 days

Delivery Method

hybrid

Level

professional

ATTEND IN-PERSON: Onsite in Abu Dhabi

ATTEND ONLINE: Virtual via Zoom and LMS

DATE: 22-23 November 2021

TIME: 09:00 to 17:00 GST/GMT+4

Date Day Time Duration
22 November Monday 09:00 to 17:00 GST/GMT+4 8 Hours
23 November Tuesday 09:00 to 17:00 GST/GMT+4 8 Hours

 


Random numbers are very important in many fields of computer science, especially in cryptography. One of the most important usage of pseudorandom number generators (PRNG) are key generation methods for cryptographic purposes. In PKI systems prime number generation is a vital process to make protocols secure. This course explains through practical and real examples how to identify and hide backdoors in asymmetric cryptographic protocols using modified random number generators. This class is focusing on practical examples and real life case studies. During the course we will analyze and implement fully undetectable and indistinguishable backdoors in common applications such as SSH, HTTPS, PGP and VPN.

Why You Should Take This Course

This class is meant for security researchers with passion for Cryptography, Number theory and Penetration testing.

Who Should Attend

– Advanced CTF players – Cryptography Enthusiasts – Penetration testers – Ethical hackers – Bug hunters – Security engineers / consultants

Key Learning Objectives

  • Identifying & hiding backdoors in asymmetric cryptographic protocols

  • Theory of Kleptography : the study of stealing information securely and subliminally

  • Practical implementation of hidden backdoors (SSH, HTTPS, PGP,VPN)

  • Case study 1: Creating X.509 extended validation (EV) SSL certificates with embedded backdoors

  • Case study 2: Modifying the prime generation method of the OPENSSL library to produce secretly embedded backdoors in prime numbers and certificates

  • Case study 3: Hidden backdoors in VPN protocols
  • Prerequisite Knowledge

    • Cryptography
    • Number Theory
    • Python programming skills,
    • Wireshark

    Hardware / Software Requirements

    Laptop with guest virtual machines (Linux and Windows 7,8 or 10). Each virtual machine should have 2 GB RAM, with shared folder feature enabled. Preinstalled software’s on the Linux machine: latest OpenSSL library, PARI/GP computer algebra system, Number Field Sieve (NFS) factorization algorithm (CADO-NFS).

    Your Instructor

    No data was found