YoVDO

Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Secure Communication Courses Computer Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a 21-minute conference talk from Crypto 2016 on message transmission with reverse firewalls, presented by Yevgeniy Dodis, Ilya Mironov, and Noah Stephens-Davidowitz. Delve into the challenges of secure communication on corrupted machines, examining topics such as cryptographic software bugs, algorithm substitution attacks, and reverse firewall functionality. Learn about message-transmission protocols, perandomizable hybrid encryption, and composition theorems. Gain insights into the complexities of trusting computers in cryptographic operations and discover potential solutions for enhancing security in real-world scenarios.

Syllabus

Message Transmission with Secure Communication on Corrupted Machines
Should Alice Trust Her Computer?
Bugs in Cryptographic Software
of Hardware and Software
Crypto in the Real World?
Algorithm Substitution Attacks
Reverse Firewalls!
Reverse Firewall Functionality
Reverse Firewall Security
Simple Example
What if the firewall is corrupt?
Primitives with Reverse Firewalls
Message-Transmission Protocols
Problems with Simple PKE Scheme
Perandomizable Hybrid Encryption?
Composition Theorem (Informal)
with a Secure Firewall
Open Questions


Taught by

TheIACR

Related Courses

Securing Digital Democracy
University of Michigan via Coursera
Computer Science 101
Stanford University via Coursera
Introduction to Cybersecurity for Business
University of Colorado System via Coursera
Proactive Computer Security
University of Colorado System via Coursera
How Computers Work
University of London International Programmes via Coursera