YoVDO

Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Network Security Courses Security Models Courses IPsec Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about privacy-preserving authenticated key exchange (PPAKE) and its application to the Internet Key Exchange version 2 (IKEv2) protocol in this conference talk presented at PKC 2020. Explore the classical key exchange setting, multi-homed servers, and the general case before delving into the motivation for PPAKE. Discover the contributions and overview of the security model, including attack capabilities, security experiment, and guarantees. Examine the applicability to other security models, focusing on IPsec with signature-based authentication. Gain insights into Phase 2 of the protocol and the PPAKE security proof before reaching the conclusion of this informative presentation on cryptographic key exchange protocols.

Syllabus

Intro
Classical Key Exchange Setting
Multi-Homed Servers
General Case
Motivation for PPAKE
Contribution
Overview Security Model
PPAKE Security Model: Attack Capabilities
PPAKE Security Experiment
PPAKE Security Guarantees
Applicability to other Security Models
IPsec with Signature-based Authentication
Phase 2
PPAKE Security Proof
Conclusion


Taught by

TheIACR

Related Courses

Microsoft Azure Solutions Architect: Implement a Virtual Networking Strategy
Pluralsight
Cisco Network Security: VPN
LinkedIn Learning
Virtual Private Networks for beginners - VPN, Cisco training
Udemy
Cisco Enterprise Networks: Troubleshooting BGP and GRE Tunnels
Pluralsight
Windows 10 Configuring (70-697): Configure Networking
Pluralsight