Difference between revisions of "Training Historical and Modern Cryptography for Security Professionals"

Difference between revisions of "Training Historical and Modern Cryptography for Security Professionals"

From BruCON 2016

Jump to: navigation, search
Line 16: Line 16:
Laptop with virtualization software
=Trainers Biography=
=Trainers Biography=

Revision as of 20:47, 12 July 2014

Historical and Modern Cryptography for Security Professionals by Chris Lytle & Dan Crowley

Course Description

With the recent renewed debate on the necessity of privacy, cryptography is once again in the public eye. Due to the gulf between classical cryptography and mechanized modern cryptography it can be difficult to know where to start in order to get an applicable background in cryptography for the modern security professional.

In this course, we'll start with the earliest and most important ciphers and cryptographic concepts and build on that knowledge using important ciphers from across the ages until we can talk about contemporary digital cryptosystems and finally, how to attack them. Over the course of this training we'll discuss the history of how ciphers came to be, what role they played, and how they fell. We will also implement these ciphers and cryptanalyze them. Attendees should bring a VMWare enabled laptop, all other materials will be provided.


  • Build a foundation for understanding of modern cryptography based on historical cryptography
  • Provide practical experience in analyzing and breaking historical cryptography
  • Develop an understanding of modern cryptographic concepts
  • Introduce common mistakes made in modern cryptosystems and provide practical experience in exploiting them

Course Contents



Laptop with virtualization software

Trainers Biography

Daniel (aka "unicornFurnace") is a Senior Security Consultant for Trustwave's SpiderLabs team. Daniel denies all allegations regarding unicorn smuggling and questions your character for even suggesting it. Daniel has developed configurable testbeds such as SQLol and XMLmao for training and research regarding specific vulnerabilities. Daniel enjoys climbing large rocks. Daniel has been working in the information security industry since 2004 and is a frequent speaker at conferences including Black Hat, DEF CON, Shmoocon, and SOURCE. Daniel does his own charcuterie. Daniel also holds the title of Baron in the micronation of Sealand.

Mon. 22 - Tue. 23 September 2014 (09:00 - 17:00)


Back to Training Overview