A Unilateral-to-Mutual Authentication Compiler for Key Exchange - with Applications to Client Authentication in TLS 1.3
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Explore a comprehensive conference talk on key exchange authentication presented at CCS 2016. Delve into the SIGMAC compiler for unilateral-to-mutual authentication, its applications in TLS 1.3 client authentication, and the concept of treplication security. Examine motivating questions, subtleties in implementation, and the methodology of functional security. Learn about post-handshake client authentication, encrypted CSM, and gain insights into signing server identity. This 35-minute presentation by Hugo Krawczyk from IBM Research offers a deep dive into advanced cryptographic concepts and their practical applications in secure communications.
Syllabus
Intro
Authenticated Key Exchange
Motivating Questions (TLS 1.3)
The SIGMAC Compiler
On the value sid
Subtleties
Treplication Security Definition
Treplication-Secure Protocols
Signing server's identity
Post-Handshake Client Authentication
Methodology: Functional Security
Encrypted CSM
Summary
Taught by
ACM CCS
Related Courses
Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor BrowserAssociation for Computing Machinery (ACM) via YouTube DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube