Crypto-Exploit Exercises: A tool for reinforcing basic topics in Cryptography

Presented at DerbyCon 3.0 All in the Family (2013), Sept. 28, 2013, 6 p.m. (50 minutes).

The crypto-exploit exercises virtual machine (VM) is a learning tool that teaches concepts via giving the user a chance to solve actual problems. A virtual machine has been set up with nine different cryptographic problems. The topics covered in crypto exploit exercises include simple ciphers, weak encryption schemes, weak key choices, one time pad encryption, in-sync encryption, secret sharing, public key encryption, CPA-security and CCA-security. This talk will give a short introduction to cryptographic concepts, and then introduce the Crypto-Exploit exercises VM and how to use it.


Presenters:

  • Nancy Snoke
    Nancy Snoke is a software engineer with Cisco Systems with a focus on security. She has degrees in Computer Engineering and Physics from Tulane University, and has a Masters in Computer Science from the University of Illinois Urbana-Champaign. She has been a professional software engineer for 8 years, and has always loved security.

Links:

Similar Presentations: