{"guid":"import-4703df2362d43a594d","title":"Automatic Identification of Cryptographic Primitives in Software","subtitle":null,"slug":"27c3-4160-en-automatic_identification_cryptographic_primitives","link":"http://events.ccc.de/congress/2010/Fahrplan/events/4160.en.html","description":"In this talk I demonstrate our research and the implementation of methods to detect cryptographic algorithms and their parameters in software. Based on\nour observations on cryptographic code, I will point out several inherent characteristics to design signature-based and generic identification methods.\n","original_language":"eng","persons":["Felix Gröbert"],"tags":["27c3"," Hacking"],"view_count":47,"promoted":false,"date":"2010-12-27T01:00:00.000+01:00","release_date":"2011-01-04T01:00:00.000+01:00","updated_at":"2026-01-21T11:45:13.568+01:00","length":3081,"duration":3081,"thumb_url":"https://static.media.ccc.de/media/congress/2010/27c3-4160-en-automatic_identification_cryptographic_primitives.jpg","poster_url":"https://static.media.ccc.de/media/congress/2010/27c3-4160-en-automatic_identification_cryptographic_primitives_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2010/import-4703df2362d43a594d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2010/import-4703df2362d43a594d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/27c3-4160-en-automatic_identification_cryptographic_primitives","url":"https://api.media.ccc.de/public/events/import-4703df2362d43a594d","conference_title":"27C3: We Come In Peace","conference_url":"https://api.media.ccc.de/public/conferences/27c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1},{"event_id":24,"event_guid":"import-df7b25850170e056b1","weight":1},{"event_id":483,"event_guid":"import-d30458e3d16d8486cd","weight":1},{"event_id":1002,"event_guid":"import-d1a2539c03d11cc281","weight":1},{"event_id":1436,"event_guid":"import-b6cba2c62c6ac212a4","weight":2},{"event_id":1451,"event_guid":"import-383c676610cff2f149","weight":2},{"event_id":1455,"event_guid":"import-524e41ae54d3230bb9","weight":2},{"event_id":1468,"event_guid":"import-c101d62bc033267900","weight":1},{"event_id":1469,"event_guid":"import-7cc5774ada31a7936e","weight":4},{"event_id":1474,"event_guid":"import-00d4d9403ecf738d65","weight":2},{"event_id":1482,"event_guid":"import-da8c8f72ccd7d97fb9","weight":1},{"event_id":1500,"event_guid":"import-04c71afb67d8628e11","weight":1},{"event_id":1511,"event_guid":"import-50d23406ba6bbed62d","weight":1},{"event_id":1519,"event_guid":"import-7c24eae3ff97e72737","weight":2},{"event_id":1526,"event_guid":"import-8f741823f0d689a05e","weight":1},{"event_id":1531,"event_guid":"import-324570bd16ebe02b27","weight":1},{"event_id":3236,"event_guid":"3ed24374-7c3e-4d29-a13a-a0adb06e72f9","weight":1},{"event_id":4095,"event_guid":"5a032505-3b50-5e50-b434-504c20dc8d76","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1}],"recordings":[{"size":713,"length":3081,"mime_type":"audio/ogg","language":"eng","filename":"27c3-4160-en-automatic_identification_cryptographic_primitives.ogg","state":"downloaded","folder":"ogg-audio-only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:52.037+02:00","recording_url":"https://cdn.media.ccc.de/congress/2010/ogg-audio-only/27c3-4160-en-automatic_identification_cryptographic_primitives.ogg","url":"https://api.media.ccc.de/public/recordings/2755","event_url":"https://api.media.ccc.de/public/events/import-4703df2362d43a594d","conference_url":"https://api.media.ccc.de/public/conferences/27c3"},{"size":713,"length":3081,"mime_type":"video/mp4","language":"eng","filename":"27c3-4160-en-automatic_identification_cryptographic_primitives.mp4","state":"downloaded","folder":"mp4-h264-HQ","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:42.386+01:00","recording_url":"https://cdn.media.ccc.de/congress/2010/mp4-h264-HQ/27c3-4160-en-automatic_identification_cryptographic_primitives.mp4","url":"https://api.media.ccc.de/public/recordings/2754","event_url":"https://api.media.ccc.de/public/events/import-4703df2362d43a594d","conference_url":"https://api.media.ccc.de/public/conferences/27c3"},{"size":713,"length":3081,"mime_type":"video/webm","language":"eng","filename":"27c3-4160-en-automatic_identification_cryptographic_primitives.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:42.422+01:00","recording_url":"https://cdn.media.ccc.de/congress/2010/webm/27c3-4160-en-automatic_identification_cryptographic_primitives.webm","url":"https://api.media.ccc.de/public/recordings/2753","event_url":"https://api.media.ccc.de/public/events/import-4703df2362d43a594d","conference_url":"https://api.media.ccc.de/public/conferences/27c3"}]}