Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a 21-minute conference talk from Crypto 2016 on message transmission with reverse firewalls, presented by Yevgeniy Dodis, Ilya Mironov, and Noah Stephens-Davidowitz. Delve into the challenges of secure communication on corrupted machines, examining topics such as cryptographic software bugs, algorithm substitution attacks, and reverse firewall functionality. Learn about message-transmission protocols, perandomizable hybrid encryption, and composition theorems. Gain insights into the complexities of trusting computers in cryptographic operations and discover potential solutions for enhancing security in real-world scenarios.
Syllabus
Message Transmission with Secure Communication on Corrupted Machines
Should Alice Trust Her Computer?
Bugs in Cryptographic Software
of Hardware and Software
Crypto in the Real World?
Algorithm Substitution Attacks
Reverse Firewalls!
Reverse Firewall Functionality
Reverse Firewall Security
Simple Example
What if the firewall is corrupt?
Primitives with Reverse Firewalls
Message-Transmission Protocols
Problems with Simple PKE Scheme
Perandomizable Hybrid Encryption?
Composition Theorem (Informal)
with a Secure Firewall
Open Questions
Taught by
TheIACR
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography I
Stanford University via Coursera The Quantum Internet and Quantum Computers: How Will They Change the World?
Delft University of Technology via edX IoT Device Configuration and Communication: C Edition
Microsoft via edX The Ultimate Dark Web, Anonymity, Privacy & Security Course
Udemy