Talks at ToorCon range from device hacking and reverse engineering, to protocol analysis, cryptographic algorithms, and all-around security issues.
32.
The low-level, or'light-weight', API is a set of APIs that implement all the underlying cryptographic algorithms.
33.
Public key cryptography systems often rely on cryptographic algorithms based on mathematical problems that exchange of one ( or more ) secret keys between the parties.
34.
Methods used to achieve transmission security include frequency hopping and spread spectrum where the required pseudorandom sequence generation is controlled by a cryptographic algorithm and key.
35.
The fact that a keyspace is very large is useless if the cryptographic algorithm used has vulnerabilities which make it susceptible to other kinds of attacks.
36.
This process is called function stitching, and while in principle it can be applied to any combination of cryptographic algorithms, GCM is especially suitable.
37.
As well as being aware of cryptographic history, cryptographic algorithm and system designers must also sensibly consider probable future developments while working on their designs.
38.
The security of some important cryptographic algorithms, notably RSA and the Blum Blum Shub pseudorandom number generator, rests in the difficulty of factorizing large integers.
39.
Both STU-III and STE are built on technologies that are proprietary, and details of the cryptographic algorithms ( BATON and FIREFLY ) are classified.
40.
Timing attacks and other side-channel attacks may also be useful in identifying, or possibly reverse-engineering, a cryptographic algorithm used by some device.