YoVDO

Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Network Security Courses Security Models Courses IPsec Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about privacy-preserving authenticated key exchange (PPAKE) and its application to the Internet Key Exchange version 2 (IKEv2) protocol in this conference talk presented at PKC 2020. Explore the classical key exchange setting, multi-homed servers, and the general case before delving into the motivation for PPAKE. Discover the contributions and overview of the security model, including attack capabilities, security experiment, and guarantees. Examine the applicability to other security models, focusing on IPsec with signature-based authentication. Gain insights into Phase 2 of the protocol and the PPAKE security proof before reaching the conclusion of this informative presentation on cryptographic key exchange protocols.

Syllabus

Intro
Classical Key Exchange Setting
Multi-Homed Servers
General Case
Motivation for PPAKE
Contribution
Overview Security Model
PPAKE Security Model: Attack Capabilities
PPAKE Security Experiment
PPAKE Security Guarantees
Applicability to other Security Models
IPsec with Signature-based Authentication
Phase 2
PPAKE Security Proof
Conclusion


Taught by

TheIACR

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity