SlideShare una empresa de Scribd logo
1 de 93
Descargar para leer sin conexión
(Mis)using
Cryptography
!

Slides by: Ynon Perek
http://ynonperek.com
ynon@ynonperek.com
Agenda
n

Why

n

Misusing Crypto Algorithms

n

Misusing RNG
What can go wrong ?
What can go wrong ?

n

n

(2011) A small internet company writes a
facebook game for Bezeq - winner gets an iPad
Developer had a problem
What can go wrong ?
n

After the game ends, he wanted to send the
score back to the server

0000000: 4e7a 1400 0000 0100 1212 33F1 5b62 4b5f  Nz.......q.3[bK_"
0000010: 16ea 0b5c ff7b b6d4 7c78 f2f4 7a70 00ce  ....{..|x..zp.."
0000020: c700 7cd1 93e3 8b44 e31a 32              ..|....D..2"

score
What Would You Do ?
Who Are You Afraid Of
?
What can go wrong ?
n

To protect score from tampering, the developer
added a secret code that only he knew how to
calculate after the score

0000000: 4e7a 1400 0000 0100 1212 33F1 5b62 4b5f  Nz.......q.3[bK_"
0000010: 16ea 0b5c ff7b b6d4 7c78 f2f4 7a70 00ce  ....{..|x..zp.."
0000020: c700 7cd1 93e3 8b44 e31a 32              ..|....D..2"

Secret Code
What can go wrong ?

n
n

The code is different to every score
To change score, a hacker would need to
understand how to calculate the code
What can go wrong ?
n

n

Hackers easily found the
rules for calculating auth
code
Game broken.
Developer unemployed
Why You Should Care

n

Cryptography isn’t magic

n

Misuse leads to failure
The Problem
SSH / SSL / TLS
Stream Cipher
MD5

GCM

ECB Mode

Block Cipher
RC4

RNG
DH
SHA1 / SHA2 /
SHA3
Digital Signature

Rainbow Tables

RSA
The Problem

n

It’s Complicated

n

Too busy to read spec
Misusing
Crypto
Algorithms
Rolling Your Own
Using The Wrong Algorithm
Encryption
Tamper Proofing
Future Proofing
Home Grown Crypto
n

n
n

Crypto primitives are
tested by experts
Don’t grow your own
Only use primitives you
fully understand
What We Need
n

Fingerprint

n

Symmetric Encryption

n

Tamper Proofing
Fingerprinting
n

A fingerprint is something storable
that represents something big
Fingerprinting
n

n

Digital fingerprint is kept
using a Hash function
H(data) = unique
fingerprint

Occaecat nulla retro, before they sold out swag nesciunt in ut
sriracha jean shorts commodo aliqua velit id fugiat. Tofu plaid
Pinterest, eiusmod aesthetic selvage semiotics dreamcatcher
aliquip locavore farm-to-table meggings master cleanse odio
Bushwick. Biodiesel Williamsburg yr direct trade, pickled
dreamcatcher ethnic keffiyeh. Cliche Brooklyn nihil commodo
helvetica dolor. Church-key fanny pack hashtag VHS. Ullamco
consequat nostrud incididunt typewriter asymmetrical. Retro
aute four loko pickled tattooed Neutra.

H(...)
46a03c37c1d9b9a79a192aa84e3b9475
Fingerprint
n

A Collision is an event of two
different data having the same finger
print
Fingerprint Risks

n

Server indexes data by fingerprint

n

Adversary creates collisions to break the server
Fingerprint Gone Bad
Hash Functions

n

Use SHA-3 to prevent collisions

n

SHA-2 is also safe
Hash Functions
n

Avoid using for fingerprints:
n

n

n

MD4, MD5, CRC

MD5 Collisions:
http://www.win.tue.nl/hashclash/rogue-ca/
Rethink SHA-1
Practical attacks expected ~2018
Quiz

n

What’s the difference between a Hash and a
password verifier ?
Q&A
Fingerprints
Encryption
n

Use When:
n
n

Privileged parties need to read the data
Adversaries must not understand anything
about it
Encryption
n

Attack Types:
n

Cipher-text only

n

Known plaintext

n

Chosen plaintext

n

Chosen cipher-text
Encryption
n

Available Tools:
n

Stream Ciphers (RC4, Salsa20)

n

Block Ciphers (DES, AES, RC5, Blowfish)
Stream Cipher
Cipher Seed
Key Stream

XOR
Message Stream
Cipher Stream
Bad Ciphers
n

Cipher(K, M1) = C1

n

Cipher(K, M2) = C2

n

K ^ M1 = C1

n

K ^ M2 = C2

n

K
Key Reuse Demo
n

Don’t re-use the key for different messages

!
use
use
use
use
use
my
 
my
my
 
write_file
write_file
write_file
Quiz: Spot the bug
public
{
paramArrayOfByte1
paramArrayOfByte2

!

!

}

this
this
this
this
this
paramArrayOfByte2
this
this
this
this
this
Quiz
n

n

Diagram describes WEP
encryption
IV is 24bit, and unique
per packet

n

Packet size = 1500 bytes

n

Where’s the bug ?
RC4 Cipher
n

Other issues
n
n

n

Key Scheduling (WEP)
Cipher-text malleability

Bottom line: Don’t run with scissors (
www.youtube.com/watch?v=A6CP7wRLE3E
Salsa20 Cipher
n

Considered safe

n

Keep key a secret

n

Send IVs as plain-text

n

Demo: salsa20.rb
Quiz
n

n

n

Big company with
millions of subscribers
need to issue a unique
key to each
Keeping all the keys in
the DB would take too
much storage
What would you
suggest ?
Quiz

n

What’s an IV ?

n

What do you do with it ?
Block Ciphers
!
!
!
n

Encrypt block to another block

n

Recommended cipher: AES
Block Modes
Input

Blocks
Output
ECB Mode
Avoid ECB Mode

Cleartext

ECB Mode
CBC Mode
CBC Problems
Padding Oracle
n

Conditions for the attack:

n

valid padding + valid value = Success message

n

valid padding + invalid value = Error message

n

invalid padding + valid value = Exception
In The Wild

n

(CVE-2010-3332) Microsoft .NET Framework
… provides detailed error codes during
decryption attempts
Avoid CBC Mode
n

n
n

CBC Mode does not
authenticate ciphertext
Risk: Padding Oracles
Read More:
http://
blog.gdssecurity.com/
labs/2010/9/14/
automated-paddingoracle-attacks-withpadbuster.html
Symmetric Encryption
n

Use AES in GCM mode

n

Implemented in OpenSSL >= 1

n

With random IV

n

And key taken from a PBKDF2
Demo: Ruby GCM
require
 
# currently, AES-256-GCM or AES-256-CTR-HMAC-SHA-256
mode   =
 
key    = mode.
nonce  = mode.
cipher = mode.
!
aead      = cipher.
# aead[1] = 'f'
plaintext = cipher.
 
puts
Symmetric Encryption
n

n

n

C#
http://clrsecurity.codeplex.com/wikipage?
title=Security.Cryptography.AuthenticatedAesC
ng
Java
https://github.com/pjstadig/gcm-test/blob/
master/src/test/java/name/stadig/gcm/
GCMTest.java
Ruby
https://github.com/onelogin/aead
Quiz

n

Why is it considered harmful to decrypt a
message from an external source ?
Quiz

n

What’s a nonce ?

n

What is its role in the encryption process ?
Q&A
Symmetric Encryption
Tamper Proofing
Server

Please keep this data
and don’t change it
Client
Tamper Proofing

n

Use a special hash function (called HMAC)

n

Protects against changing message AND hash
Tamper Proofing
OpenSSL command line to generate HMAC
(one line)

n

echo
!

openssl dgst
Bad Cryptography
n

What’s the difference between:
n

n

echo
-hmac
echo
Other Languages
n

n

n

.NET
http://msdn.microsoft.com/en-us/library/
system.security.cryptography.hmac.aspx
Ruby
http://ruby-doc.org/stdlib-1.9.3/libdoc/
openssl/rdoc/OpenSSL/HMAC.html
Perl
https://metacpan.org/module/Digest::HMAC
Tamper Proofing FAIL
n

Flickr API (2009)

http://www.flickr.com/services/
auth/?
!
api_key=44fefa051fc1c61f5e76f27
e620f51d5&
!
extra=/login&
!
perms=write&
!
api_sig=38d39516d896f879d403bd3
27a932d9e
Demo: Hash Extension
n

n

n

Calculate:
original_md5 = MD5(secret + message)
Create a new message:
newmessage = message + new_text
Create a new MD5 based on original_md5 AND
newmessage (without using secret)
Bug Spotting
n

The following are considered weak and should
be avoided:
n

RC4

n

MD4, MD5

n

DES, 3DES (or TripleDES)

n

ECB (For any block cipher)
Bad Crypto

n

(2008) Fake X.509 due to MD5 collisions

n

MD5 Considered harmful today
Bad Crypto
Bad Crypto

n

(2009) Adobe upgrades from MD5 to SHA-256

n

Accidentally removing the KDF
Bad Crypto
n

n

n

(2011) Breaking XML
Encryption
CBC + Wrong padding +
Server leaking info
Result: Hacked
Quiz

n

Which hash function is not vulnerable to length
extension attack ?
Q&A
Crypto Primitives
Random Numbers
Real RNG

n

True randomness

n

Expensive and slow
Pseudo RNG
840

511

737

277

?
Pseudo RNG

n

Start with an initial seed

n

Generate random numbers
Pseudo RNG
n

Given a sequence, can you find the seed ?

n

PRNG -> it depends

n

CSRNG -> you can’t
RNG
n

Use CSPRNG for

n

Use PRNG for

n

Demo Cracking Python RNG:
https://github.com/fx5/not_random
Demo
CS PRNG

use
my

Toy PRNG

my
Other Languages
n

Java ->
java.security.SecureRandom

n

.NET ->
System.Security.Cryptography.RNGCryptoServiceProvider

n

Ruby ->
SecureRandom
Bug Spotting

sub
    
}
Recent Bug
n

n

2006-2008 Debian used a broken
CS-RNG
Developer commented out important
parts of RNG code
Dual_EC_DRBG
Dual_EC_DRBG
n

Dual elliptic curve deterministic random bit
generator

n

Published in 2007, suspected with a backdoor

n

Proved by snowden’s papers
Dual_EC_DRBG

n

Full story
http://blog.cryptographyengineering.com/
2013/09/the-many-flaws-of-dualecdrbg.html
Public Keys (PKI)
In The Box
n

Certificate Authority (CA)

n

Digital Certificates (Private & Public key)

n

Key Distribution Server

n

Desktop and Server software
Demo: PGP

n

n

Started by Phil
Zimmerman 1991
PKI for all
PGP Today

n

n

GNU took over to provide patent-free
implementation
Called GPG (Gnu Privacy Guard)
GPG Components
n

Certificate Authority
n

Each user creates his own certificated.

n

Allow Web Of Trust
GPG Components
n

Digital Certificates
n

Supported algorithms: RSA, DSA, ElGamal

n

Key length: 1024-8192

n

Recommended: 2048 bits
GPG Components
n

Key Distribution Server
n

Can build your own or use the default

n

Distribute keys
GPG Components
n

Desktop and Server software
n

Linux, Windows and Mac

n

http://www.gnupg.org/
GPG Demo
n

Creating Key-pair

n

Search for keys

n

Encrypt / Decrypt

n

Sign / Verify
Q&A
Public Keys
Crypto Takeaways

n

Crypto’s hard: Don’t grow your own crypto
Crypto Takeaways

n

Crypto’s hard: But lazy is not an option

n

Choose the right tool for the job
Think About Tomorrow
n

n

Today’s algorithms may
fail tomorrow
Keep future in mind
when designing code
Thanks For Listening
n

Ynon Perek
n
n

n

http://ynonperek.com
ynon@ynonperek.com

Pictures From:
n

Wikipedia (Public Domain)

n

123rf.com

n

Stockfresh.com

Más contenido relacionado

Similar a Using Cryptography Wrongly Can Lead to Security Failures

[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜Seungmin Shin
 
March.2012.KinectForWindows
March.2012.KinectForWindowsMarch.2012.KinectForWindows
March.2012.KinectForWindowsReuben Ahmed
 
Defeating the entropy downgrade attack
Defeating the entropy downgrade attackDefeating the entropy downgrade attack
Defeating the entropy downgrade attackSeth Wahle
 
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...All Things Open
 
How to Use Cryptography Properly: The Common Mistakes People Make When Using ...
How to Use Cryptography Properly: The Common Mistakes People Make When Using ...How to Use Cryptography Properly: The Common Mistakes People Make When Using ...
How to Use Cryptography Properly: The Common Mistakes People Make When Using ...POSSCON
 
Cryptography - You're doing it wrong! (Attila Balazs)
Cryptography - You're doing it wrong! (Attila Balazs)Cryptography - You're doing it wrong! (Attila Balazs)
Cryptography - You're doing it wrong! (Attila Balazs)ITCamp
 
[2012 CodeEngn Conference 06] posquit0 - Defcon 20th : The way to go to Las V...
[2012 CodeEngn Conference 06] posquit0 - Defcon 20th : The way to go to Las V...[2012 CodeEngn Conference 06] posquit0 - Defcon 20th : The way to go to Las V...
[2012 CodeEngn Conference 06] posquit0 - Defcon 20th : The way to go to Las V...GangSeok Lee
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hackingPranshu Pareek
 
KeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timeKeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timen|u - The Open Security Community
 
BalCCon2k18 - Towards the perfect cryptocurrency wallet
BalCCon2k18 - Towards the perfect cryptocurrency walletBalCCon2k18 - Towards the perfect cryptocurrency wallet
BalCCon2k18 - Towards the perfect cryptocurrency walletNemanja Nikodijević
 
Verifiably Random
Verifiably RandomVerifiably Random
Verifiably RandomDavid Evans
 
Make believe - Droidcon UK 2015
Make believe - Droidcon UK 2015Make believe - Droidcon UK 2015
Make believe - Droidcon UK 2015Shanee Nishry
 
PhD Thesis Diogo Mónica
PhD Thesis Diogo MónicaPhD Thesis Diogo Mónica
PhD Thesis Diogo MónicaDiogo Mónica
 
Just Mouse Jack Init
Just Mouse Jack InitJust Mouse Jack Init
Just Mouse Jack Initantitree
 
Django SEM
Django SEMDjango SEM
Django SEMGandi24
 
Using Cryptography Properly in Applications
Using Cryptography Properly in ApplicationsUsing Cryptography Properly in Applications
Using Cryptography Properly in ApplicationsGreat Wide Open
 
Doug Hill Presentation
Doug Hill PresentationDoug Hill Presentation
Doug Hill PresentationMediabistro
 
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj MishraThwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj MishraOWASP Delhi
 
Stegosploit - Hacking With Pictures HITB2015AMS
Stegosploit - Hacking With Pictures HITB2015AMSStegosploit - Hacking With Pictures HITB2015AMS
Stegosploit - Hacking With Pictures HITB2015AMSSaumil Shah
 

Similar a Using Cryptography Wrongly Can Lead to Security Failures (20)

[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
 
March.2012.KinectForWindows
March.2012.KinectForWindowsMarch.2012.KinectForWindows
March.2012.KinectForWindows
 
Defeating the entropy downgrade attack
Defeating the entropy downgrade attackDefeating the entropy downgrade attack
Defeating the entropy downgrade attack
 
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...
 
How to Use Cryptography Properly: The Common Mistakes People Make When Using ...
How to Use Cryptography Properly: The Common Mistakes People Make When Using ...How to Use Cryptography Properly: The Common Mistakes People Make When Using ...
How to Use Cryptography Properly: The Common Mistakes People Make When Using ...
 
Cryptography - You're doing it wrong! (Attila Balazs)
Cryptography - You're doing it wrong! (Attila Balazs)Cryptography - You're doing it wrong! (Attila Balazs)
Cryptography - You're doing it wrong! (Attila Balazs)
 
[2012 CodeEngn Conference 06] posquit0 - Defcon 20th : The way to go to Las V...
[2012 CodeEngn Conference 06] posquit0 - Defcon 20th : The way to go to Las V...[2012 CodeEngn Conference 06] posquit0 - Defcon 20th : The way to go to Las V...
[2012 CodeEngn Conference 06] posquit0 - Defcon 20th : The way to go to Las V...
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
 
KeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timeKeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long time
 
BalCCon2k18 - Towards the perfect cryptocurrency wallet
BalCCon2k18 - Towards the perfect cryptocurrency walletBalCCon2k18 - Towards the perfect cryptocurrency wallet
BalCCon2k18 - Towards the perfect cryptocurrency wallet
 
Verifiably Random
Verifiably RandomVerifiably Random
Verifiably Random
 
Cryptography 202
Cryptography 202Cryptography 202
Cryptography 202
 
Make believe - Droidcon UK 2015
Make believe - Droidcon UK 2015Make believe - Droidcon UK 2015
Make believe - Droidcon UK 2015
 
PhD Thesis Diogo Mónica
PhD Thesis Diogo MónicaPhD Thesis Diogo Mónica
PhD Thesis Diogo Mónica
 
Just Mouse Jack Init
Just Mouse Jack InitJust Mouse Jack Init
Just Mouse Jack Init
 
Django SEM
Django SEMDjango SEM
Django SEM
 
Using Cryptography Properly in Applications
Using Cryptography Properly in ApplicationsUsing Cryptography Properly in Applications
Using Cryptography Properly in Applications
 
Doug Hill Presentation
Doug Hill PresentationDoug Hill Presentation
Doug Hill Presentation
 
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj MishraThwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
 
Stegosploit - Hacking With Pictures HITB2015AMS
Stegosploit - Hacking With Pictures HITB2015AMSStegosploit - Hacking With Pictures HITB2015AMS
Stegosploit - Hacking With Pictures HITB2015AMS
 

Más de Ynon Perek

Qt multi threads
Qt multi threadsQt multi threads
Qt multi threadsYnon Perek
 
Mobile Devices
Mobile DevicesMobile Devices
Mobile DevicesYnon Perek
 
Architecture app
Architecture appArchitecture app
Architecture appYnon Perek
 
Unit Testing JavaScript Applications
Unit Testing JavaScript ApplicationsUnit Testing JavaScript Applications
Unit Testing JavaScript ApplicationsYnon Perek
 
How to write easy-to-test JavaScript
How to write easy-to-test JavaScriptHow to write easy-to-test JavaScript
How to write easy-to-test JavaScriptYnon Perek
 
Introduction to Selenium and Ruby
Introduction to Selenium and RubyIntroduction to Selenium and Ruby
Introduction to Selenium and RubyYnon Perek
 
Introduction To Web Application Testing
Introduction To Web Application TestingIntroduction To Web Application Testing
Introduction To Web Application TestingYnon Perek
 
Qt Design Patterns
Qt Design PatternsQt Design Patterns
Qt Design PatternsYnon Perek
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application SecurityYnon Perek
 
JavaScript DOM Manipulations
JavaScript DOM ManipulationsJavaScript DOM Manipulations
JavaScript DOM ManipulationsYnon Perek
 

Más de Ynon Perek (20)

Regexp
RegexpRegexp
Regexp
 
Html5 intro
Html5 introHtml5 intro
Html5 intro
 
Qt multi threads
Qt multi threadsQt multi threads
Qt multi threads
 
Syllabus
SyllabusSyllabus
Syllabus
 
Mobile Devices
Mobile DevicesMobile Devices
Mobile Devices
 
Network
NetworkNetwork
Network
 
Architecture app
Architecture appArchitecture app
Architecture app
 
Unit Testing JavaScript Applications
Unit Testing JavaScript ApplicationsUnit Testing JavaScript Applications
Unit Testing JavaScript Applications
 
How to write easy-to-test JavaScript
How to write easy-to-test JavaScriptHow to write easy-to-test JavaScript
How to write easy-to-test JavaScript
 
Introduction to Selenium and Ruby
Introduction to Selenium and RubyIntroduction to Selenium and Ruby
Introduction to Selenium and Ruby
 
Introduction To Web Application Testing
Introduction To Web Application TestingIntroduction To Web Application Testing
Introduction To Web Application Testing
 
Angularjs
AngularjsAngularjs
Angularjs
 
Js memory
Js memoryJs memory
Js memory
 
Qt Design Patterns
Qt Design PatternsQt Design Patterns
Qt Design Patterns
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
JavaScript DOM Manipulations
JavaScript DOM ManipulationsJavaScript DOM Manipulations
JavaScript DOM Manipulations
 
Mongodb Intro
Mongodb IntroMongodb Intro
Mongodb Intro
 
Node JS
Node JSNode JS
Node JS
 
D3 js
D3 jsD3 js
D3 js
 
Intro to SVGs
Intro to SVGsIntro to SVGs
Intro to SVGs
 

Último

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Último (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Using Cryptography Wrongly Can Lead to Security Failures