Learning Practical Cryptography and secure implementations


Ajit Hatti

We will build Solid Understanding of the basic primitives, schemes and building blocks of cryptography + PKI.

Next we will see how to securely implement these blocks in any system and also detect and exploit vulnerable implementations.

We will use OpenSSL as our Swiss Army Knife and practically understand how the cryptography, benchmarking, crypto-assessment, back door detection is done. We will see how the balance between security requirements and the performance & compliance is achieved by choosing the right set of primitives.

Course Content (TOC):

Understanding The Basic Building Blocks of Cryptography & PKI
  • Using Trustable Crypto Source & Libraries
  • OpenSSL : Swiss Army knife of Cryptography [Lots of hands on assessment here]
Defining & Testing Secure Communications
  • Configuring an HTTPS server
  • Understanding SSL/TLS communication & Flaws
  • Attacks on SSL/TLS protocols using web Proxies
  • Undocumented Attacks & Bypasses for SSL/TLS
  • Perfect Forward Secrecy
Storing and Retrieval/Archiving of the Sensitive Data
  • Basic Cryptographic algorithms
  • Understanding the Limitations & attacks on cryptographic algorithms
  • Malware precaution & protection
  • Storing & Securing sensitive Data in Cloud
Processing Sensitive Data
  • In memory processing of sensitive data
  • Securing data processing in Cloud
  • Browser Hacks on sensitive data caching
Recent & Popular attacks
  • Heart Bleed to SSL Sniff/Strip
  • Back-dooring the (P)RNG & other crypto algorithms
  • Hashes & Collisions
Exploitation in Post Quantum Scenerio
  • Post Quantum & Contemporaneity Cryptography
  • Quantum Key Generation & Distribution
  • Post Quantum Crypto Systems
More Attacks
  • Timing Attacks
    • OCSP stappeling
    • HSTS time stamps
    • PRNG Functions
  • Crypt Analysis
  • Side Channel Attacks


  • Basic understanding of security concepts - Data integrity, impersonation, data sniffing
  • Basic ability to script and run linux commands
  • Some experience with capturing packets and analysis of of TCP/IP frames
  • Very basic elementary maths

Participants Requirements

  • A laptop with a Linux, Mac or access to Linux OS of your choice is a must
  • Openssl any version, C/C++ compilers, python 2/3 for tooling and scripting
  • Browser, web proxy & any Web Server instance on your machine.

Who Should Attend

  • Security Professionals responsible for Testing, Developing, Designing, Auditing critical systems with Cryptographic implementations

What to expect

  • Working use and abuse of PKI systems using Openssl Toolkit
  • Know how to test and exploit secure protocols, encrypted networks, few crypt analysis techniques
  • Where to look for flaws in systems secured by cryptography
  • What are the latest attacks in the Cryptographic world and how do they work
  • Know end to end use and abuse of Browser to Web server secure channels
  • Know few advanced standards and theoretical attacks.

What not to expect

  • A to Z of the Mathematics Behind the Cryptographic standards
  • Breaking Google, FB, Banks secure communication by successful cryptanalysis
  • This course tries to gives you basic but essential knowledge of cryptography to be an effective Pen-testers, auditors, to become a Cryptographer Lets join a PHD course :)
Course Dates
29 & 30 August, 2020
5 & 6 September, 2020
4 Days

Related Courses

Secure code audit is a highly effective process of identifying vulnerabilities in software.
Ethereum is a next generation blockchain which facilitates smart contracts over the internet.
This course is the culmination of years of experience gained via practical pentesting of mobile applications as well as countless hours spent in research.
To provide a hands on training on the technical aspects of attack simulation and red teaming tactics.