SlideShare a Scribd company logo
@adam_englander
Cryptography for Beginners
Adam Englander
Software Architect, iovation
@adam_englander
I am a Virtual Crime Fighter
@adam_englander
I am a lover of PHP
@adam_englander
I Am Not…
• … a security researcher
• … a cryptographer
• … a mathematician
@adam_englander
What To Expect
• Gain a working understanding of common
terms used in cryptography.
• Understand the key drivers for choosing
cryptography methodologies, algorithms and
strengths.
• Know which PHP modules to use.
@adam_englander
What Not to Expect
• Deep dive into algorithms
• A lot of comparison between algorithms and
implementations
• Become a cryptography expert
@adam_englander
What Is Cryptography?
Cryptography…is	the	practice	and	study	of	
techniques	for	secure	communication	in	
the	presence	of	third	parties	called	
adversaries.
Wikipedia
@adam_englander
My Definition of Cryptography
Cryptography	obscures	data	in	such	a	way	
that	it	is	difficult	and	costly	to	duplicate	
or	reverse.
@adam_englander
How do you make it difficult?
@adam_englander
–Oxford Dictionary
Entropy:
Lack of order or predictability; gradual
decline into disorder.”
@adam_englander
The greater the entropy; the
greater the difficulty.
@adam_englander
@adam_englander
Achieving Maximum Entropy
• Use Cryptographically Secure Pseudo-Random Number
Generators (CSPRNG).
• Salts add global randomness to hashing.
• Feedback loops add local randomness to block ciphers.
• Initialization Vectors add global randomness to block
ciphers.
• Some ciphers introduce randomness with padding.
@adam_englander
Local vs Global Entropy
Local entropy is
entropy with a
singular pice of data
within a larger
system.
Global entropy is
entropy of the same
or similar data across
the entirety of a larger
system.
@adam_englander
How Random Is Random?
• It turns out it can be quite random as long as you
use the correct tools.
• Since PHP7, CSPRNG extension provides platform
independent cryptographically secure pseudo-
random data.
• Until you move to PHP7, paragonie/random_compat
package will give you the same functionality.
@adam_englander
How do you make it expensive?
@adam_englander
Algorithms that are difficult to
crack with brute force
@adam_englander
@adam_englander
@adam_englander
@adam_englander
@adam_englander
What Contributes to Cost?
Secrets
Computation
Entropy
@adam_englander
Computational Cost
• Complexity of algorithm increases cost.
• Key length increases cost.
• Some algorithms specifically target memory
and thread utilization to increase cost.
• Feedback loops increase cost.
@adam_englander
Cryptography is based on
ciphers
@adam_englander
@adam_englander
@adam_englander
Encryption Signatures
Key Derivation Hashing
@adam_englander
Encryption
@adam_englander
Asymmetric Encryption
• Based on very large
prime numbers
• Computationally
expensive
• Padding for entropy
• Cannot encrypt data
larger the the key
@adam_englander
Asymmetric Key Cryptography
• RSA and DSA are available in PHP. Use RSA.
• Uses very large prime integers
• Very computationally expensive
• Uses key pairs to protect secret
@adam_englander
Super Duper Secret
• Private key can do encrypt, decrypt, sign, and
verify signature
• Public key does not have enough data to
decrypt or sign. Can only encrypt and verify
signature
@adam_englander
Key Size and Hash Algorithm
• Current minimum recommend key size is 2048
• SHA1 is considered safe but SHA-256 is better
@adam_englander
Data Limitations
• RSA can only encrypt or sign data up to the
length of the key size
• Signatures use hashing
• Crypto often mixed with symmetric key
cryptography
@adam_englander
Padding
• Padding is how RSA creates additional
entropy
• Use Optimal Asymmetric Encryption Padding
(OAEP)
• Do not use PKCS1-V1_5 as it is no longer
considered cryptographically secure
@adam_englander
Symmetric Encryption
• Uses small shared key
• Has modes for
encrypting data larger
than the key
• Fast encryption
• Uses initialization vector
and key for entropy
Block Cipher Modes
DO NOT USE Electronic Cookbook (ECB)!!!
@adam_englander
@adam_englander
Block	cipher	modes	determine	how	the	
blocks	of	clear	text	are	translated	into	
cipher	text.
What are Block Cipher Modes?
@adam_englander
Cipher Block Chaining (CBC)
• Entire message is required for decryption
• Full cipher text block is used as the seed for
the next block
@adam_englander
Cipher Block Chaining (CBC)
@adam_englander
Galois Counter Mode (GCM)
• Counter based cipher stream
• Entire message is required for decryption
• Encrypts plain text and generates an
authentication code similar to an HMAC
simultaneously that is returned with the IV in
the cipher text
@adam_englander
Galois Counter Mode (GCM)
@adam_englander
Hashing
@adam_englander
Hashes by themselves aren’t very useful!
@adam_englander
Signatures
@adam_englander
Digital Signature
• Used to verify integrity of data
• Used mostly for data transfer
• Can be used for verifying data at rest
• Can not be reversed but can be reproduced
for verification
@adam_englander
Digital Signatures (HMAC)
• Hash-based Message Authentication Code
(HMAC)
• Hashing combined with key
• SHA-256 or better is preferred to ensure
uniqueness
@adam_englander
Key Derivation
@adam_englander
Key Derivation
• Uses salt for entropy
• Iterates to increase cost
• Can create cost via threads and memory
• Bigger is better!
@adam_englander
Which KDF Should I Use?
• argon2i is the new hotness
• scrypt is preferred
• bcrypt is acceptable
• PBKDF2 can be used in a pinch
@adam_englander
How Can I Use KDFs?
• PHP has the best package for managing that
PERIOD! Use the password extension. Just
use it!
• For *cough* pre-5.5.0, you can use ircmaxell/
password-compat
• Provides tools for hash upgrades. AWESOME!
@adam_englander
And now…an example
@adam_englander
@adam_englander
@adam_englander
@adam_englander
Hi Bob, I’m Alice.
Can you hear me?
Bob Alice
Client starts
TCP session by
sending a
synchronized
packet to the
server
@adam_englander
Bob Alice
Yes Alice, I can
hear you. Can you
hear me?
Server responds by
sending SYNchronize-
ACKnowledgement
packet to the client
@adam_englander
Yes Bob, I can hear
you.
Bob Alice
Client completes
TCP session the
initialization by
sending
ACKnowledge
packet to the
server
@adam_englander
This is
conversation
12345. I know
German and
Spanish.
Bob Alice
Client informs the
server the session
requires TLS and
sends the TLS version
number, cipher
settings, public key,
and session-specific
data.
@adam_englander
Bob Alice
Let’s use German.
Here’s my ID.
Server chooses
the cipher
settings and
sends
Certificate.
@adam_englander
Bob Alice
The
signature on his
ID matches. He’s
Bob.
Client verifies
the server’s
certificate by
verifying the
signature
against the
known
certificate
authority.
@adam_englander
Ich denke an
eine Farbe, die Sie
mit gelb zu
machen.
Bob Alice
Client and
server begin a
conversation
that is now
encrypted using
asymmetric
encryption.
@adam_englander
The rest of the conversation would
be in German. But, we’ll show it in
English.
@adam_englander
 I have a color
that makes orange
with yellow with
yellow.
Bob Alice
Session symmetric key
negotiation begins with
client generating a
secret random value
and sending a shared
value and a value
derived from the two.
Alice’s secret is red, the
shared value is yellow,
and the derived value is
orange.
@adam_englander
Bob Alice
I have a color
than makes green
with yellow.
The server generates its
own secret random
value and sends a
value derived from it
and the shared value.
Bobs secret is blue, the
shared value is yellow,
and the derived value is
green.
@adam_englander
Bob Alice
Our shared color
is purple.
Both determine a
new shared
value based on
combining the
two secret
values.
Alice’s secret is
red. Bob’s secret
is blue. Their
combined
secrets are
purple.
@adam_englander
ログイン ページを
教えてください
Bob Alice
Client sends HTTP
request the server
for the login page
using symmetric
encryption with the
newly negotiated
key.
@adam_englander
Bob Alice
ここで、ログイン
ページです
Server sends an HTTP
response with the
login page HTML
using symmetric
encryption with the
newly negotiated key
to the client.
@adam_englander
@adam_englander
Recommendations
@adam_englander
Disclaimers
• Although every app is different, commonalities
exist across most applications
• I am only recommending what I know and have
vetted directly or indirectly via my work
experience
• If you think you are different, ask yourself if the
advantages outweigh the risks
@adam_englander
Types
• Use RSA asymmetric key cryptography when
transferring data
• Mix with AES and random keys/IVs per transfer
• Use CSPRNG extension/package for keys, salts
and initialization vectors
• Use password extension/package for passwords
@adam_englander
Strength
• Use the strongest cryptography you can afford
• AES: aes-256-cbc / sha256 minimum
• RSA: 2048+ PKCS1_OAEP / RSA-SHA256
• Hash until it hurts!
@adam_englander
Packages/Libraries
• Use OpenSSL for encryption and digital signatures
• For extreme compatibility, use phpseclib/phpseclib
• Use CSPRNG extension/package for keys, salts
and initialization vectors
• Use password extension/package for passwords
@adam_englander
MCrypt
DO NOT USE THIS!
IT IS DEPRECATED!
IF YOU ARE USING THIS. PLAN YOUR
MIGRATION AWAY NOW!
@adam_englander
Password Hashing
• password_hash to hash
• password_verify to check password against the
hashed value
• password_needs_rehash to ssh if the hash
needs updated
@adam_englander
Hash
• hash_hmac for hashing - sha256 for algorithm
@adam_englander
OpenSSL
• AES-CBC or AES-GCM
• RSA for asymmetric encryption
• PBKDF2 for key derivation - not so great
@adam_englander
libsodium
• AES-GCM or ChaCha20-Poly1305 for symmetric
encryption including auth tag
• XSalsa20-Poly1305 for asymmetric encryption
• Ed25519 for asymmetric digital signatures
• Blake2b for hashing
• Argon2 and Scrypt KDFs for password hashing
@adam_englander
Resources
• https://secure.php.net/manual/en/book.openssl.php
• https://secure.php.net/manual/en/book.csprng.php
• https://secure.php.net/manual/en/
book.password.php
• https://packagist.org/packages/phpseclib/phpseclib
• https://en.wikipedia.org/wiki/Cryptography
Ad

More Related Content

Similar to ZendCon 2017 - Cryptography for Beginners (20)

Fundamentals of Cryptography: Securing Data in the Digital Age
Fundamentals of Cryptography: Securing Data in the Digital AgeFundamentals of Cryptography: Securing Data in the Digital Age
Fundamentals of Cryptography: Securing Data in the Digital Age
avengersimran16
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
Karthikeyan Dhayalan
 
big data and Iot , its security part ,hoe yoy help this
big data and Iot , its security part ,hoe yoy help thisbig data and Iot , its security part ,hoe yoy help this
big data and Iot , its security part ,hoe yoy help this
warriorshanta
 
Information Security 05- Encryption.pdfn
Information Security 05- Encryption.pdfnInformation Security 05- Encryption.pdfn
Information Security 05- Encryption.pdfn
faiziikanwal47
 
RSA Algoritmn
RSA AlgoritmnRSA Algoritmn
RSA Algoritmn
Dr. Kapil Gupta
 
Encryption
Encryption Encryption
Encryption
Adnan Malak
 
introduction to cryptography and its basic techniques
introduction to cryptography and its basic techniquesintroduction to cryptography and its basic techniques
introduction to cryptography and its basic techniques
AneelSoomro1
 
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
ssuserc7a853
 
computer literacy works papers and pencil ew 9-crypt.ppt
computer literacy works papers and pencil ew 9-crypt.pptcomputer literacy works papers and pencil ew 9-crypt.ppt
computer literacy works papers and pencil ew 9-crypt.ppt
dumaguitlouie4
 
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
vikashbharati917
 
Computer security communication networking cryptography .ppt
Computer security communication networking cryptography .pptComputer security communication networking cryptography .ppt
Computer security communication networking cryptography .ppt
tipurple7989
 
Chaos based cryprography - encryption & hash function
Chaos based cryprography - encryption & hash functionChaos based cryprography - encryption & hash function
Chaos based cryprography - encryption & hash function
ssuser478d0e
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
Ghamdan5
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
akamkhalidmohammed
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
RaghavRathi40
 
7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff
maninthemirrorrror
 
RSA.ppt
RSA.pptRSA.ppt
RSA.ppt
LakshayYadav46
 
Best book for the cryptography doctor.ppt
Best book for the cryptography doctor.pptBest book for the cryptography doctor.ppt
Best book for the cryptography doctor.ppt
nicolausalex722
 
Crytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.pptCrytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.ppt
MuhammadShajid1
 
7 cryptography
7 cryptography7 cryptography
7 cryptography
Upinder Kaur
 
Fundamentals of Cryptography: Securing Data in the Digital Age
Fundamentals of Cryptography: Securing Data in the Digital AgeFundamentals of Cryptography: Securing Data in the Digital Age
Fundamentals of Cryptography: Securing Data in the Digital Age
avengersimran16
 
big data and Iot , its security part ,hoe yoy help this
big data and Iot , its security part ,hoe yoy help thisbig data and Iot , its security part ,hoe yoy help this
big data and Iot , its security part ,hoe yoy help this
warriorshanta
 
Information Security 05- Encryption.pdfn
Information Security 05- Encryption.pdfnInformation Security 05- Encryption.pdfn
Information Security 05- Encryption.pdfn
faiziikanwal47
 
introduction to cryptography and its basic techniques
introduction to cryptography and its basic techniquesintroduction to cryptography and its basic techniques
introduction to cryptography and its basic techniques
AneelSoomro1
 
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
ssuserc7a853
 
computer literacy works papers and pencil ew 9-crypt.ppt
computer literacy works papers and pencil ew 9-crypt.pptcomputer literacy works papers and pencil ew 9-crypt.ppt
computer literacy works papers and pencil ew 9-crypt.ppt
dumaguitlouie4
 
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
vikashbharati917
 
Computer security communication networking cryptography .ppt
Computer security communication networking cryptography .pptComputer security communication networking cryptography .ppt
Computer security communication networking cryptography .ppt
tipurple7989
 
Chaos based cryprography - encryption & hash function
Chaos based cryprography - encryption & hash functionChaos based cryprography - encryption & hash function
Chaos based cryprography - encryption & hash function
ssuser478d0e
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
Ghamdan5
 
7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff
maninthemirrorrror
 
Best book for the cryptography doctor.ppt
Best book for the cryptography doctor.pptBest book for the cryptography doctor.ppt
Best book for the cryptography doctor.ppt
nicolausalex722
 
Crytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.pptCrytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.ppt
MuhammadShajid1
 

More from Adam Englander (20)

Making PHP Smarter - Dutch PHP 2023.pptx
Making PHP Smarter - Dutch PHP 2023.pptxMaking PHP Smarter - Dutch PHP 2023.pptx
Making PHP Smarter - Dutch PHP 2023.pptx
Adam Englander
 
Practical API Security - PyCon 2019
Practical API Security - PyCon 2019Practical API Security - PyCon 2019
Practical API Security - PyCon 2019
Adam Englander
 
Threat Modeling for Dummies
Threat Modeling for DummiesThreat Modeling for Dummies
Threat Modeling for Dummies
Adam Englander
 
ZendCon 2018 - Practical API Security
ZendCon 2018 - Practical API SecurityZendCon 2018 - Practical API Security
ZendCon 2018 - Practical API Security
Adam Englander
 
ZendCon 2018 - Cryptography in Depth
ZendCon 2018 - Cryptography in DepthZendCon 2018 - Cryptography in Depth
ZendCon 2018 - Cryptography in Depth
Adam Englander
 
Threat Modeling for Dummies - Cascadia PHP 2018
Threat Modeling for Dummies - Cascadia PHP 2018Threat Modeling for Dummies - Cascadia PHP 2018
Threat Modeling for Dummies - Cascadia PHP 2018
Adam Englander
 
Dutch PHP 2018 - Cryptography for Beginners
Dutch PHP 2018 - Cryptography for BeginnersDutch PHP 2018 - Cryptography for Beginners
Dutch PHP 2018 - Cryptography for Beginners
Adam Englander
 
php[tek] 2108 - Cryptography Advances in PHP 7.2
php[tek] 2108 - Cryptography Advances in PHP 7.2php[tek] 2108 - Cryptography Advances in PHP 7.2
php[tek] 2108 - Cryptography Advances in PHP 7.2
Adam Englander
 
php[tek] 2018 - Biometrics, fantastic failure point of the future
php[tek] 2018 - Biometrics, fantastic failure point of the futurephp[tek] 2018 - Biometrics, fantastic failure point of the future
php[tek] 2018 - Biometrics, fantastic failure point of the future
Adam Englander
 
Biometrics: Sexy, Secure and... Stupid - RSAC 2018
Biometrics: Sexy, Secure and... Stupid - RSAC 2018Biometrics: Sexy, Secure and... Stupid - RSAC 2018
Biometrics: Sexy, Secure and... Stupid - RSAC 2018
Adam Englander
 
Practical API Security - PyCon 2018
Practical API Security - PyCon 2018Practical API Security - PyCon 2018
Practical API Security - PyCon 2018
Adam Englander
 
Practical API Security - Midwest PHP 2018
Practical API Security - Midwest PHP 2018Practical API Security - Midwest PHP 2018
Practical API Security - Midwest PHP 2018
Adam Englander
 
Cryptography for Beginners - Midwest PHP 2018
Cryptography for Beginners - Midwest PHP 2018Cryptography for Beginners - Midwest PHP 2018
Cryptography for Beginners - Midwest PHP 2018
Adam Englander
 
Cryptography for Beginners - Sunshine PHP 2018
Cryptography for Beginners - Sunshine PHP 2018Cryptography for Beginners - Sunshine PHP 2018
Cryptography for Beginners - Sunshine PHP 2018
Adam Englander
 
ConFoo Vancouver 2017 - Biometrics: Fantastic Failure Point of the Future
ConFoo Vancouver 2017 - Biometrics: Fantastic Failure Point of the FutureConFoo Vancouver 2017 - Biometrics: Fantastic Failure Point of the Future
ConFoo Vancouver 2017 - Biometrics: Fantastic Failure Point of the Future
Adam Englander
 
Con Foo 2017 - Don't Loose Sleep - Secure Your REST
Con Foo 2017 - Don't Loose Sleep - Secure Your RESTCon Foo 2017 - Don't Loose Sleep - Secure Your REST
Con Foo 2017 - Don't Loose Sleep - Secure Your REST
Adam Englander
 
ZendCon 2017: The Red Team is Coming
ZendCon 2017: The Red Team is ComingZendCon 2017: The Red Team is Coming
ZendCon 2017: The Red Team is Coming
Adam Englander
 
Symfony Live San Franciso 2017 - BDD API Development with Symfony and Behat
Symfony Live San Franciso 2017 - BDD API Development with Symfony and BehatSymfony Live San Franciso 2017 - BDD API Development with Symfony and Behat
Symfony Live San Franciso 2017 - BDD API Development with Symfony and Behat
Adam Englander
 
Coder Cruise 2017 - The Red Team Is Coming
Coder Cruise 2017 - The Red Team Is ComingCoder Cruise 2017 - The Red Team Is Coming
Coder Cruise 2017 - The Red Team Is Coming
Adam Englander
 
Build a bot workshop async primer - php[tek]
Build a bot workshop  async primer - php[tek]Build a bot workshop  async primer - php[tek]
Build a bot workshop async primer - php[tek]
Adam Englander
 
Making PHP Smarter - Dutch PHP 2023.pptx
Making PHP Smarter - Dutch PHP 2023.pptxMaking PHP Smarter - Dutch PHP 2023.pptx
Making PHP Smarter - Dutch PHP 2023.pptx
Adam Englander
 
Practical API Security - PyCon 2019
Practical API Security - PyCon 2019Practical API Security - PyCon 2019
Practical API Security - PyCon 2019
Adam Englander
 
Threat Modeling for Dummies
Threat Modeling for DummiesThreat Modeling for Dummies
Threat Modeling for Dummies
Adam Englander
 
ZendCon 2018 - Practical API Security
ZendCon 2018 - Practical API SecurityZendCon 2018 - Practical API Security
ZendCon 2018 - Practical API Security
Adam Englander
 
ZendCon 2018 - Cryptography in Depth
ZendCon 2018 - Cryptography in DepthZendCon 2018 - Cryptography in Depth
ZendCon 2018 - Cryptography in Depth
Adam Englander
 
Threat Modeling for Dummies - Cascadia PHP 2018
Threat Modeling for Dummies - Cascadia PHP 2018Threat Modeling for Dummies - Cascadia PHP 2018
Threat Modeling for Dummies - Cascadia PHP 2018
Adam Englander
 
Dutch PHP 2018 - Cryptography for Beginners
Dutch PHP 2018 - Cryptography for BeginnersDutch PHP 2018 - Cryptography for Beginners
Dutch PHP 2018 - Cryptography for Beginners
Adam Englander
 
php[tek] 2108 - Cryptography Advances in PHP 7.2
php[tek] 2108 - Cryptography Advances in PHP 7.2php[tek] 2108 - Cryptography Advances in PHP 7.2
php[tek] 2108 - Cryptography Advances in PHP 7.2
Adam Englander
 
php[tek] 2018 - Biometrics, fantastic failure point of the future
php[tek] 2018 - Biometrics, fantastic failure point of the futurephp[tek] 2018 - Biometrics, fantastic failure point of the future
php[tek] 2018 - Biometrics, fantastic failure point of the future
Adam Englander
 
Biometrics: Sexy, Secure and... Stupid - RSAC 2018
Biometrics: Sexy, Secure and... Stupid - RSAC 2018Biometrics: Sexy, Secure and... Stupid - RSAC 2018
Biometrics: Sexy, Secure and... Stupid - RSAC 2018
Adam Englander
 
Practical API Security - PyCon 2018
Practical API Security - PyCon 2018Practical API Security - PyCon 2018
Practical API Security - PyCon 2018
Adam Englander
 
Practical API Security - Midwest PHP 2018
Practical API Security - Midwest PHP 2018Practical API Security - Midwest PHP 2018
Practical API Security - Midwest PHP 2018
Adam Englander
 
Cryptography for Beginners - Midwest PHP 2018
Cryptography for Beginners - Midwest PHP 2018Cryptography for Beginners - Midwest PHP 2018
Cryptography for Beginners - Midwest PHP 2018
Adam Englander
 
Cryptography for Beginners - Sunshine PHP 2018
Cryptography for Beginners - Sunshine PHP 2018Cryptography for Beginners - Sunshine PHP 2018
Cryptography for Beginners - Sunshine PHP 2018
Adam Englander
 
ConFoo Vancouver 2017 - Biometrics: Fantastic Failure Point of the Future
ConFoo Vancouver 2017 - Biometrics: Fantastic Failure Point of the FutureConFoo Vancouver 2017 - Biometrics: Fantastic Failure Point of the Future
ConFoo Vancouver 2017 - Biometrics: Fantastic Failure Point of the Future
Adam Englander
 
Con Foo 2017 - Don't Loose Sleep - Secure Your REST
Con Foo 2017 - Don't Loose Sleep - Secure Your RESTCon Foo 2017 - Don't Loose Sleep - Secure Your REST
Con Foo 2017 - Don't Loose Sleep - Secure Your REST
Adam Englander
 
ZendCon 2017: The Red Team is Coming
ZendCon 2017: The Red Team is ComingZendCon 2017: The Red Team is Coming
ZendCon 2017: The Red Team is Coming
Adam Englander
 
Symfony Live San Franciso 2017 - BDD API Development with Symfony and Behat
Symfony Live San Franciso 2017 - BDD API Development with Symfony and BehatSymfony Live San Franciso 2017 - BDD API Development with Symfony and Behat
Symfony Live San Franciso 2017 - BDD API Development with Symfony and Behat
Adam Englander
 
Coder Cruise 2017 - The Red Team Is Coming
Coder Cruise 2017 - The Red Team Is ComingCoder Cruise 2017 - The Red Team Is Coming
Coder Cruise 2017 - The Red Team Is Coming
Adam Englander
 
Build a bot workshop async primer - php[tek]
Build a bot workshop  async primer - php[tek]Build a bot workshop  async primer - php[tek]
Build a bot workshop async primer - php[tek]
Adam Englander
 
Ad

Recently uploaded (20)

Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Ad

ZendCon 2017 - Cryptography for Beginners