{"guid":"import-1f121bb8aa988ba756","title":"Exposing Crypto Bugs through reverse engineering","subtitle":null,"slug":"26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering","link":"http://events.ccc.de/congress/2009/Fahrplan/events/3703.en.html","description":"Breaking good crypto is hard. It takes a genius to find a flaw in AES or Blowfish. On the other hand, it is also difficult to program cryptography correctly. Thus the simpler way of breaking a cryptographic software is often to reverse engineer it and find the crypto errors that were made by the programmers.\n","original_language":"eng","persons":["Philippe Oechslin"],"tags":["26c3"," Hacking"],"view_count":32,"promoted":false,"date":"2009-12-27T01:00:00.000+01:00","release_date":"2010-01-02T01:00:00.000+01:00","updated_at":"2026-03-16T05:00:04.564+01:00","length":2692,"duration":2692,"thumb_url":"https://static.media.ccc.de/media/congress/2009/26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.jpg","poster_url":"https://static.media.ccc.de/media/congress/2009/26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2009/import-1f121bb8aa988ba756-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2009/import-1f121bb8aa988ba756-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering","url":"https://api.media.ccc.de/public/events/import-1f121bb8aa988ba756","conference_title":"26C3: Here be Dragons","conference_url":"https://api.media.ccc.de/public/conferences/26c3","related":[{"event_id":1356,"event_guid":"import-79abc6678b832816fd","weight":1},{"event_id":1386,"event_guid":"import-889bf7d4f546181efe","weight":1},{"event_id":1398,"event_guid":"import-4cd820d77b40b4b492","weight":1},{"event_id":1408,"event_guid":"import-b7cf56b6bbe50e728c","weight":1},{"event_id":1418,"event_guid":"import-74d1d018eb33d0d9ba","weight":1},{"event_id":1422,"event_guid":"import-d7f37b1162046a6dc0","weight":1},{"event_id":1499,"event_guid":"import-96cc1f42578abdb340","weight":1},{"event_id":2944,"event_guid":"5fb6f7b5-c237-4b64-b786-85e4c95f13ad","weight":1},{"event_id":7342,"event_guid":"88474e85-c77c-466e-9351-d306b620f495","weight":1}],"recordings":[{"size":503,"length":2692,"mime_type":"audio/ogg","language":"eng","filename":"26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.ogg","state":"downloaded","folder":"ogg","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:50.698+02:00","recording_url":"https://cdn.media.ccc.de/congress/2009/ogg/26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.ogg","url":"https://api.media.ccc.de/public/recordings/2644","event_url":"https://api.media.ccc.de/public/events/import-1f121bb8aa988ba756","conference_url":"https://api.media.ccc.de/public/conferences/26c3"},{"size":503,"length":2692,"mime_type":"video/mp4","language":"eng","filename":"26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.mp4","state":"downloaded","folder":"mp4","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:40.162+01:00","recording_url":"https://cdn.media.ccc.de/congress/2009/mp4/26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.mp4","url":"https://api.media.ccc.de/public/recordings/2643","event_url":"https://api.media.ccc.de/public/events/import-1f121bb8aa988ba756","conference_url":"https://api.media.ccc.de/public/conferences/26c3"},{"size":503,"length":2692,"mime_type":"video/webm","language":"eng","filename":"26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:40.193+01:00","recording_url":"https://cdn.media.ccc.de/congress/2009/webm/26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.webm","url":"https://api.media.ccc.de/public/recordings/2642","event_url":"https://api.media.ccc.de/public/events/import-1f121bb8aa988ba756","conference_url":"https://api.media.ccc.de/public/conferences/26c3"}]}