YoVDO

Out of Band Authentication in Group Messaging - Computational, Statistical, Optimal

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Network Security Courses Statistical Analysis Courses End-to-End Encryption Courses Man in The Middle Attacks Courses Protocol Design Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a presentation from Crypto 2018 on out-of-band authentication in group messaging, focusing on computational, statistical, and optimal aspects. Delve into the paper by Lior Rotem and Gil Segev, which addresses end-to-end encrypted messaging, man-in-the-middle attacks, and user-to-user settings. Examine the group setting, correctness and security measures, and the proposed computationally-secure protocol. Investigate concurrent non-malleable commitments, statistical lower bounds, and protocol structures. Gain insights into the challenges and solutions for secure group messaging authentication.

Syllabus

Intro
Major Effort: E2E-Encrypted Messaging
Man-in-the-Middle Attacks
The User-to-User Setting
User-to-User Bounds
This Talk: The Group Setting
Our Contributions
Correctness & Security
The Naïve Protocol
Our Computationally-Secure Protocol
Example: One Possible Attack
Concurrent Non-Malleable Commitments
Our Statistical Lower Bound
Protocol Structure
Understanding H(E)


Taught by

TheIACR

Related Courses

Sicher per E-Mail kommunizieren - Mitleser unerwünscht
openHPI
Introduction to Data Security Course (How To)
Treehouse
QuickChat 2.0 (WhatsApp like chat) iOS10 and Swift 3
Udemy
iOS 12 Chat Application like WhatsApp and Viber
Udemy
End-to-End Encryption - Behind the Scenes
Strange Loop Conference via YouTube