This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Study The Latest Cryptographic Techniques in Cybersecurity
From quantum encryption to threshold signature schemes, there's no better place to learn about the latest cryptographic issues in cybersecurity than Black Hat USA next month.
From quantum encryption to threshold signature schemes, there's never been a more exciting time to be working in the cryptographic side of cybersecurity, and no better place to learn about it than Black Hat.
At next month's virtual Black Hat USA event attendees can look forward to expert instruction on the latest practical, real-world advances in cryptography, informed by an attacker's sensibility.
For some cutting-edge insight into blockchain security, make time to check out this year's Briefing on Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets. Part of the Black Hat USA Cryptography track of Briefings, this session will quickly get you up to speed on MPC (multi-party computation) and TSS (threshold signature schemes) in a way suitable for non-experts, highlighting their unique properties and showing how they can be used to protect enterprise-grade wallets.
You'll also learn a new type of logical vulnerability, enabled by extra layers of complexity in TSS implementations, which opens up a new attack surface for devastating attacks, allowing a malicious participant to sabotage key generation and break TSS's security.
And in A Hacker's Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning a Google security expert will bring you up to speed on how deep-learning based side-channel attacks have been proven to be very effective, and opened the door to automated implementation techniques.
Building on this line of work, this Briefing will take the approach a step further and show you how to leverage the recent advance in AI explainability to quickly assess which parts of the implementation is responsible for the information. Through practical, step-by-step examples you will learn the promise of this approach, its limitations, and how it can be used today in your own work!
If you have the time and the passion to really deep dive into the future of cryptography in cybersecurity, sign up now for the Black Hat USA Towards Quantum-Safe Security Training. This 4-Day Training will efficiently introduce you to today's quantum computers and the threat they pose to cybersecurity, the quantum risk assessment methodology, and the possible solutions and their implementation.
There's never been a better time to sign on for this sort of deep study of quantum security, because while a quantum computer capable of factoring large integers (and therefore of breaking most existing public key cryptosystems) has yet to debut, the risk is now real and increasing.
In an interesting twist, quantum technologies offer a possible answer to the quantum computer threat. Learn all about them, and get hands-on practice in applying them in practical quantum risk assessments, during this promising Training at Black Hat USA next month!
Register now for this year's fully virtual Black Hat USA, still scheduled to take place August 1st through 6th, and get more information about the event on the Black Hat website.