Adversarial Perspectives on Cryptography (A32b)
While most auditing of cryptographic modules are around its effectiveness against an adversary, adversaries themselves are also updating their tooling to use strong cryptography. From crypto-locking malware to advanced command-and-control (C2) systems, strong cryptographic systems are increasingly important both to real-world attackers and red team and penetration test activities. In this talk, we discuss various crypto systems in use today, their effectiveness both in ensuring confidentiality and evading detection, and ways that adversarial tools employ cryptography, both successfully and unsuccessfully. We will also discuss future trends and means for detection and interception of strong cryptography for the defender.