Partitioning Oracle Attacks
Offered By: TheIACR via YouTube
Course Description
Overview
Syllabus
Intro
Modern Symmetric Cryptography
Authenticated Encryption
(Non-) Committing AEAD
What we know about non-committing AEAD Definitional landscape
Brute-force Dictionary Attack
Partitioning Oracle Attacks: Setting Setting interface has secret pwchosen from D
Key multi-collision attacks Targeted multi-key collision resistance TMKCRI
Computing Key Multi-Collisions for AES-GCM then
An Overview of GHASH A Carter Wegman MAC which computes over Galois field GF213
Shadowsocks: threat model
Password Recovery for Shadowsocks
Shadowsocks Attack: experimental evaluation
OPAQUE: building partitioning oracles
OPAQUE: early implementations
OPAQUE An asymmetric Pasword Authenticated Key Exchange (PAKE)
Vulnerabilities from non-committing AEAD (so far)
Taught by
TheIACR
Related Courses
Unlocking Information Security II: An Internet PerspectiveTel Aviv University via edX Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera Complete Ethical Hacking Bootcamp
Udemy Cyber Security Advanced Persistent Threat Defender Preview
Udemy Performing Threat Modeling with the PASTA Methodology
Pluralsight