Another Look at Provable Security
Offered By: TheIACR via YouTube
Course Description
Overview
Syllabus
Intro
What this talk is about
Example of a non-tight reduction The classic Bellare-Rogaway proof for RSA-FDH in the random oracle model has a tightness gap of y, where is the number of hash function queries
Identity-based encryption schemes
Does tightness matter?
MACs in the multi-user setting
Security proof for MAC* The proof is a reduction from breaking MAC1 to breaking MAC
Provably secure, but insecure
MAC* in other protocols
Single-user vs. multi-user
Bellare's security theorem for NMAC
PRF security Security assumption: f is (t,c,q)-secure. That is, adversaries
PRF security in the non-uniform model
Interpreting Bellare's proof in practice
Is HMAC-MD5 provably secure?
Non-uniform complexity model
Significance of our work
COPS: Cryptanalysis of Provable Security
A radical proposal
In conclusion....
Taught by
TheIACR
Related Courses
How Secure and Quick is QUIC? Provable Security and Performance AnalysesIEEE via YouTube Provable Security at AWS - Automated Reasoning for Cloud Security
USENIX Enigma Conference via YouTube On the Provable Security of -EC-DSA Signatures
Association for Computing Machinery (ACM) via YouTube Provable Security
media.ccc.de via YouTube Jonathan Katz - Introduction to Cryptography Part 1 of 3 - IPAM at UCLA
Institute for Pure & Applied Mathematics (IPAM) via YouTube