CONIKS - Bringing Key Transparency to End Users
Offered By: USENIX via YouTube
Course Description
Overview
Syllabus
Intro
E2E Encrypted Communication Today
Unsolved: How do users establish trust?
Out-of-Band Trust Est. = Unintuitive
Trust Est. by the Provider - Better?
Malicious Provider can Equivocate
Pros/Cons of Existing Trust Establishment
Ideal Trust Establishment Properties
Existing Approach: Verifying Correctness
Our Approach: Verifying Consistency
Solution: CONIKS
CONIKS - Registering a Key
CONIKS-Learning a User's Key
Strawman Consistency Checks: Verify All Bindings
CONIKS: Efficient Checks thru "Summaries"
CONIKS - Main Security Properties
1. Expected Bindings incl. in STR - Auth Paths
1. Checking Inclusion - Verify Auth Path
2. Non-Equivocation - STR History
2. Non-Equivocation - Clients see same STRS
2. Checking Non-Equivocation - Cross-Verification
Privacy Challenges in CONIKS
Main Performance Questions
CONIKS' Performance is Practical!
Conclusion
Taught by
USENIX
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network