YoVDO

A Unilateral-to-Mutual Authentication Compiler for Key Exchange - with Applications to Client Authentication in TLS 1.3

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

ACM CCS (Computer and Communications Security) Courses Key Exchange Courses Computer Security Courses TLS 1.3 Courses

Course Description

Overview

Explore a comprehensive conference talk on key exchange authentication presented at CCS 2016. Delve into the SIGMAC compiler for unilateral-to-mutual authentication, its applications in TLS 1.3 client authentication, and the concept of treplication security. Examine motivating questions, subtleties in implementation, and the methodology of functional security. Learn about post-handshake client authentication, encrypted CSM, and gain insights into signing server identity. This 35-minute presentation by Hugo Krawczyk from IBM Research offers a deep dive into advanced cryptographic concepts and their practical applications in secure communications.

Syllabus

Intro
Authenticated Key Exchange
Motivating Questions (TLS 1.3)
The SIGMAC Compiler
On the value sid
Subtleties
Treplication Security Definition
Treplication-Secure Protocols
Signing server's identity
Post-Handshake Client Authentication
Methodology: Functional Security
Encrypted CSM
Summary


Taught by

ACM CCS

Related Courses

A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs
Association for Computing Machinery (ACM) via YouTube
Acing the IOC Game - Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence
Association for Computing Machinery (ACM) via YouTube
Call Me Back! Attacks on System Server and System Apps in Android through Synchronous Callback
Association for Computing Machinery (ACM) via YouTube
A Comprehensive Formal Security Analysis of OAuth 2.0
Association for Computing Machinery (ACM) via YouTube
A Secure Sharding Protocol for Open Blockchains
Association for Computing Machinery (ACM) via YouTube