Another Look at Provable Security
Offered By: TheIACR via YouTube
Course Description
Overview
Syllabus
Intro
What this talk is about
Example of a non-tight reduction The classic Bellare-Rogaway proof for RSA-FDH in the random oracle model has a tightness gap of y, where is the number of hash function queries
Identity-based encryption schemes
Does tightness matter?
MACs in the multi-user setting
Security proof for MAC* The proof is a reduction from breaking MAC1 to breaking MAC
Provably secure, but insecure
MAC* in other protocols
Single-user vs. multi-user
Bellare's security theorem for NMAC
PRF security Security assumption: f is (t,c,q)-secure. That is, adversaries
PRF security in the non-uniform model
Interpreting Bellare's proof in practice
Is HMAC-MD5 provably secure?
Non-uniform complexity model
Significance of our work
COPS: Cryptanalysis of Provable Security
A radical proposal
In conclusion....
Taught by
TheIACR
Related Courses
Breaking the Teeth of Bluetooth PadlocksYouTube Closing Keynote Lectures or Life Experiences Awareness Training that Works
YouTube Do You Want Educated Users Because This is How You Get Educated Users
YouTube Don't Blame That Checklist for Your Crappy Security Program
YouTube Managing Your MSSP
YouTube