This document provides an agenda for a talk on breaking modern cryptography. It discusses various side channel and fault injection attacks that can be used to break cryptographic implementations running on untrusted hardware. It covers side channel basics like power analysis and EM analysis techniques. It also discusses fault injection basics and how errors can be injected and propagated in cryptosystems. Finally, it summarizes countermeasures for side channel and fault injection attacks and discusses how the same techniques can be applied beyond attacking cryptography.