YoVDO

Out of Band Authentication in Group Messaging - Computational, Statistical, Optimal

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Network Security Courses Statistical Analysis Courses End-to-End Encryption Courses Man in The Middle Attacks Courses Protocol Design Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a presentation from Crypto 2018 on out-of-band authentication in group messaging, focusing on computational, statistical, and optimal aspects. Delve into the paper by Lior Rotem and Gil Segev, which addresses end-to-end encrypted messaging, man-in-the-middle attacks, and user-to-user settings. Examine the group setting, correctness and security measures, and the proposed computationally-secure protocol. Investigate concurrent non-malleable commitments, statistical lower bounds, and protocol structures. Gain insights into the challenges and solutions for secure group messaging authentication.

Syllabus

Intro
Major Effort: E2E-Encrypted Messaging
Man-in-the-Middle Attacks
The User-to-User Setting
User-to-User Bounds
This Talk: The Group Setting
Our Contributions
Correctness & Security
The Naïve Protocol
Our Computationally-Secure Protocol
Example: One Possible Attack
Concurrent Non-Malleable Commitments
Our Statistical Lower Bound
Protocol Structure
Understanding H(E)


Taught by

TheIACR

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity