Unveiling the Secrets of Cryptography with Jeff Man at CypherCon 6.0 🔐

Join Jeff Man at CypherCon 6.0 as he discusses the fundamentals and latest insights in cryptography, revealing what’s truly behind the technology that secures our digital world. Don't miss this eye-opening session!

Hackers of CypherCon78 views57:45

About this video

(S6:E16) GUR RIBYHGVBA BS PELCGBTENCUL - Jeff Man - CypherCon 6.0 - Wisconsin GUR RIBYHGVBA BS PELCGBTENCUL What’s been bugging me – crypto ain’t what it used to be from back in my NSA days (and I’m not just talking about digital currencies) I’m classically trained as a manual cryptanalyst – even earning certification as a Cryptanalyst from the National Security Agency. I’ve designed cryptosystems, a cryptologic aid, pioneered software-based cryptosystems and I’ve also broken codes and ciphers in my day. Every time I see some mention of cryptography or encryption out here in the real world (the private sector) I grimace a little because very often people don’t really understand how the algorithm works, any of the math (not that I do), the differences between symmetric and asymmetric algorithms, critical issues such as implementation, key management and key distribution. What is disturbing me most recently is the growing popularity of a “new” form or application of cryptography known as “Fully Homomorphic Encryption”. THIS IS NOT A TALK ABOUT FHE – but rather a talk about why the concept bugs the crap out of me! I see “strong cryptography” bandied about in the PCI world all the time – and I’ve all but conceded that “strong crypto” in the private sector just isn’t the same caliber of cryptography that I was accustomed to in the DoD. Too often, I hear “well it’s good enough” – but really the security of the implementation TOO OFTEN relies on the bad guys not knowing how to get to the data or how easy it would be if they tried. I had a “tipping point” moment a few weeks ago when I googled the meaning of “encryption” and found this definition on Wikipedia: “In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext.” Um…no, encoding produces code, enciphering produces ciphertext, encryption is more than just encoding, and so on. Given the jumbling together of historically very unique and significant terminology I set out to find the actual, historical definitions and try to find a way to teach and/or demonstrate the differences in the foundational forms of cryptography. But I quickly notices that some of this terminology is so often mis-applied in our digital age that I wondered if maybe there has been an evolution of the meanings of these terms? I might not like it, but I’m open to that possibility. This very quickly led me to the conclusion that my research on this topic would make for an interesting talk and so here we are. I want to share the classical, historical forms of cryptography, discuss the etymology of the terminology, look at how the words apply today – and help the audience decide if the actual meanings even matter (or it’s just me). One important consideration is the tradeoff between keeping the data secret (security) and protecting the identity of individuals associated with the data (privacy). I hope you’ll join me in this journey to victory (or defeat) in the ongoing battle of preserving the classic goals and objectives of data security. Importance: IMO – part of the reason why cybersecurity has not been solved is because it’s never been taught well/received well by the private sector. Having lived and worked for an organization whose sole mission was Information Security, I feel that there is still value in what and how we used to conduct ourselves within the DoD. I think the historical context has meaning – and I would proffer that there is benefit to understanding where we’ve come from, successes and failures, what we’ve done right/wrong, etc. – all with the goal of making people think more and/or differently about our discipline. CypherCon is an annual Wisconsin hacker conference attracting over 1500 attendees held in Milwaukee, Wisconsin each spring. https://cyphercon.com EXECUTIVE PRODUCER & SHOW ORGANIZER: Michael Goetzman SOUND: Sean Schult VIDEO PRODUCTION COMPANY: Flash Fire Productions ADDITIONAL EDITING: David Holcombe Thank you for watching, subscribing and your support. ✅ LET'S CONNECT: 🔴 WEBSITE: https://cyphercon.com 🟠 TWITTER: https://twitter.com/cyphercon 🟡 FACEBOOK: https://www.facebook.com/CypherConWisconsin 🟢 YOUTUBE: https://www.youtube.com/channel/UCJ1tF4B8G-R7nWb5uJyx8xw 🔵 EMAIL: hello@cyphercon.com Copyright © 2023 by Michael Goetzman (Monster) & CypherCon

Video Information

Views
78

Total views since publication

Likes
2

User likes and reactions

Duration
57:45

Video length

Published
Sep 18, 2023

Release date

Quality
hd

Video definition

Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in France under the topic 'jeff bezos'.

Share This Video

SOCIAL SHARE

Share this video with your friends and followers across all major social platforms including X (Twitter), Facebook, Youtube, Pinterest, VKontakte, and Odnoklassniki. Help spread the word about great content!