Cryptographic Backdoors

Speaker:  Chuck Easttom – Plano, TX, United States
Topic(s):  Computational Theory, Algorithms and Mathematics


This is an overview of cryptographic backdoors, their function and purpose. Specific research is discussed including examples such as Dual_EC_DRBG and backdoors in RSA. This is appropriate for general audiences, as the essential features of the algorithms in question will be reviewed.  Standards for evaluating the efficacy of cryptographic backdoors are also discussed.

About this Lecture

Number of Slides:  25
Duration:  60 minutes
Languages Available:  English
Last Updated: 

Request this Lecture

To request this particular lecture, please complete this online form.

Request a Tour

To request a tour with this speaker, please complete this online form.

All requests will be sent to ACM headquarters for review.