YoVDO

A Unilateral-to-Mutual Authentication Compiler for Key Exchange - with Applications to Client Authentication in TLS 1.3

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

ACM CCS (Computer and Communications Security) Courses Key Exchange Courses Computer Security Courses TLS 1.3 Courses

Course Description

Overview

Explore a comprehensive conference talk on key exchange authentication presented at CCS 2016. Delve into the SIGMAC compiler for unilateral-to-mutual authentication, its applications in TLS 1.3 client authentication, and the concept of treplication security. Examine motivating questions, subtleties in implementation, and the methodology of functional security. Learn about post-handshake client authentication, encrypted CSM, and gain insights into signing server identity. This 35-minute presentation by Hugo Krawczyk from IBM Research offers a deep dive into advanced cryptographic concepts and their practical applications in secure communications.

Syllabus

Intro
Authenticated Key Exchange
Motivating Questions (TLS 1.3)
The SIGMAC Compiler
On the value sid
Subtleties
Treplication Security Definition
Treplication-Secure Protocols
Signing server's identity
Post-Handshake Client Authentication
Methodology: Functional Security
Encrypted CSM
Summary


Taught by

ACM CCS

Related Courses

Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor Browser
Association for Computing Machinery (ACM) via YouTube
DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube
SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube
Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube
PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube