Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Learning cryptography through handcyphers

URL
http://dewy.fem.tu-ilmenau.de/CCC/22C3/audio/mp3/22C3-469-en-learning_cryptography.mp3
File name
22C3-469-en-learning_cryptography.mp3
File size
16.1 MB
MD5
8341d5f59412b4e4a3a78f10f0d8d95e
SHA1
d8224f99e5193d75e852ec8856cf42e3f3e5f38e

For many people cryptography is something that they consider too complicated. But actually one can understand the principles very well if they only try. By looking at old handcyphers used for coding one can begin to understand modern cryptography. There is still a magical mist surrounding cryptography that is still regarded as being complex and impossible to comprehend. So people shy away from exploring their options with the technology that has many useful purposes. This is actually sad, since cryptography is the cornerstone of computer security and a good cure against the ever continuing erosion of civil rights. So the technology cannot be missed and hackers should actually embrace it. Learning to understand it isn't that difficult after all. In order to understand the principles we'll go back in time to see the evolution of modern cryptography. We focus on on handcyphers that can be used without a computer and have grown in complexity throughout time even tough some early mechanisms are still in use today. Over the centuries hackers have made great contributions by cracking the algoritms and stimulated us to improve security by patching flaws. The presentation will show us many different ways of making an algoritm and help us become critical users or even better coders. The session will help people become acquinted with cryptography and is a good learning experience. It will not be groundbreaking in the sense that any new hacks will be shown. However it will be fun to be at. Please state if you are going to submit a paper to be included in the 22C3 Proceedings : If you people want to yes, but I wasn't planning it yet. Please state if you are going to use slides in your talk and in which format you are going to provide a copy : OpenOffice.org so OOO, PPT or PDF format will be present

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !