Cryptographic BackdoorsSpeaker: Chuck Easttom
Topic(s): Networks and Communications , Security and Privacy , Computational Theory, Algorithms and Mathematics
AbstractThis is an overview of cryptographic backdoors, their function and purpose. Specific research is discussed including examples such as Dual_EC_DRBG and backdoors in RSA. This is appropriate for general audiences, as the essential features of the algorithms in question will be reviewed. Standards for evaluating the efficacy of cryptographic backdoors are also discussed.
About this LectureNumber of Slides: 25
Duration: 60 minutes
Languages Available: English
Request this Lecture
To request this particular lecture, please complete this online form.
Request a Tour
To request a tour with this speaker, please complete this online form.
All requests will be sent to ACM headquarters for review.