This is the second in a series of 3 sessions on practical cryptography. In this session we'll talk about a number of practical attacks you can use on cryptosystems in the real world.
- Stream cipher key reuse
- ECB block reordering
- ECB decryption
- Padding and padding oracles
- Hash length extension