Unlocking The Secrets Of TLS - Scott Helme - NDC Security 2024

Поделиться
HTML-код
  • Опубликовано: 24 мар 2024
  • This talk was recorded at NDC Security in Oslo, Norway. #ndcsecurity #ndcconferences #security #developer #softwaredeveloper
    Attend the next NDC conference near you:
    ndcconferences.com
    ndc-security.com/
    Subscribe to our RUclips channel and learn every day:
    /‪@NDC‬
    Follow our Social Media!
    / ndcconferences
    / ndc_conferences
    / ndc_conferences
    You open your browser, type in a domain, hit enter, and then bam, a secure connection! Did you ever wonder how that happens? How do we magic a secure connection out of thin air without any prior physical meeting to shake hands and exchange encryption keys on a USB drive? We can't just send our encryption keys to each other over the Internet, so how do we do it?
    In this talk we're going to take a deep-dive into what's known as the TLS Handshake, the mechanism we use to establish secure connections on the Internet. We'll look at how it works, we'll look at some of the mistakes we've made and the resulting harsh lessons we've learned along the way, and we'll demistfy this seemingly magic process of creating secure connections from nothing!
  • НаукаНаука

Комментарии • 3

  • @DistantTower
    @DistantTower 3 месяца назад +2

    Valuable talk

  • @rudde7251
    @rudde7251 3 месяца назад

    Why does post-quantum algorithms work? Shouldn't they be just as vulnerable? Isn't the threat of a quantum computer that they can make all guesses all at once? Given we have a 11 byte secret message "Hello world" is the idea that the quantum computer don't know what message is the correct one? So "Hello world" would be just as likely as "Hello Scott" and therefore cannot with any confidence conclude the message has been decrypted?