<p>You can't be 'leet if you can't do crypto. There was a time when the difference between good crypto and bad crypto was life and death. Until the advent of modern computing, cryptography was done by hand, sometimes by candlelight by a spy in an attic surrounded by Nazis in occupied France. Today there are at least 2,381 crypto downloads at sourceforge.net, but good crypto is like a good joke -- someone clever had to start it.We'll look at how early crypto formed the foundation for secure communications, and why the discovery of asymmetric crypto is the real reason the Internet got so big so quickly. We'll walk through some crypto contests of the past couple of years, including Shmoocon 2008 and Shmoocon 2009 (as well as the Shmoocon 2009 badge puzzle), and provide you with the foundational understanding of how good crypto works, and why bad crypto fails miserably. You might not become the next Phil Zimmerman by watching this talk, but you will be able to do some pretty cool stuff.</p>
<p>G. Mark Hardy has been doing security since before you were born (well, most of you), working his first "real" computer security job in 1976 and founding National Security Corporation in 1988. With a background in information security planning and policy development, managing security assessment and penetration teams, data encryption and authentication (including "breaking" commercial cryptographic algorithms), software development and strategic planning for e-commerce, and writing commercial risk assessment software, he has presented several hundred talks on information security. He has sponsored crypto contests at Shmoocon, DEFCON, Layer One, and did the badge design for Shmoocon 2009.</p>