YoVDO

Downgrade Resilience in Key-Exchange Protocols

Offered By: IEEE via YouTube

Tags

Cryptography Courses Network Security Courses Negotiation Courses Protocol Design Courses TLS 1.3 Courses

Course Description

Overview

Explore downgrade resilience in key-exchange protocols through this 20-minute IEEE conference talk presented at the 2016 IEEE Symposium on Security & Privacy. Delve into the challenges of configurable protocols like TLS, SSH, IPsec, and ZRTP, and learn how to support configurability while ensuring the negotiation of preferred modes. Examine the causes of downgrade attacks, survey existing standards' downgrade resilience, and understand the concept of downgrade security. Discover design patterns that guarantee downgrade security and how they can be applied to strengthen existing protocols, including the draft of TLS 1.3. Gain insights into transcript authentication, downgrade-secure configurations, and protocol execution models for analyzing complex real-world protocols.

Syllabus

Intro
Downgrade as an everyday phenomen
Negotiation
Transcript authentication vs. Downgrades
Downgrade secure configurations
Protocol execution model
Reducing complex real-world protocol analysis
Downgrade security of TLS 1.3
Downgrade Resilience in key Exchange


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Negotiation and Conflict Resolution
Open2Study
Psychology of Negotiations - Reaching Sustainable Agreements in Negotiations on "Commons"
Leuphana Universität Lüneburg via Independent
Introduction to Negotiation
Stanford Law School via NovoEd
MOOC gestion de projet
École Centrale de Lille via Independent
Successful Negotiation: Essential Strategies and Skills
University of Michigan via Coursera