| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Security experts often warn against rolling your own crypto, but do we listen? Of course not! This fun talk examines many public implementations of homegrown crypto, including single-sign on, hash functions, and even completely custom encryption functions. A large study was conducted of publicly available custom single-sign on implementations and bugs were found in every single one. How to avoid the same mistakes will be included between the horrors.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast