YoVDO

Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Secure Communication Courses Computer Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a 21-minute conference talk from Crypto 2016 on message transmission with reverse firewalls, presented by Yevgeniy Dodis, Ilya Mironov, and Noah Stephens-Davidowitz. Delve into the challenges of secure communication on corrupted machines, examining topics such as cryptographic software bugs, algorithm substitution attacks, and reverse firewall functionality. Learn about message-transmission protocols, perandomizable hybrid encryption, and composition theorems. Gain insights into the complexities of trusting computers in cryptographic operations and discover potential solutions for enhancing security in real-world scenarios.

Syllabus

Message Transmission with Secure Communication on Corrupted Machines
Should Alice Trust Her Computer?
Bugs in Cryptographic Software
of Hardware and Software
Crypto in the Real World?
Algorithm Substitution Attacks
Reverse Firewalls!
Reverse Firewall Functionality
Reverse Firewall Security
Simple Example
What if the firewall is corrupt?
Primitives with Reverse Firewalls
Message-Transmission Protocols
Problems with Simple PKE Scheme
Perandomizable Hybrid Encryption?
Composition Theorem (Informal)
with a Secure Firewall
Open Questions


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography I
Stanford University via Coursera
The Quantum Internet and Quantum Computers: How Will They Change the World?
Delft University of Technology via edX
IoT Device Configuration and Communication: C Edition
Microsoft via edX
The Ultimate Dark Web, Anonymity, Privacy & Security Course
Udemy