CONIKS - Bringing Key Transparency to End Users
Offered By: USENIX via YouTube
Course Description
Overview
Syllabus
Intro
E2E Encrypted Communication Today
Unsolved: How do users establish trust?
Out-of-Band Trust Est. = Unintuitive
Trust Est. by the Provider - Better?
Malicious Provider can Equivocate
Pros/Cons of Existing Trust Establishment
Ideal Trust Establishment Properties
Existing Approach: Verifying Correctness
Our Approach: Verifying Consistency
Solution: CONIKS
CONIKS - Registering a Key
CONIKS-Learning a User's Key
Strawman Consistency Checks: Verify All Bindings
CONIKS: Efficient Checks thru "Summaries"
CONIKS - Main Security Properties
1. Expected Bindings incl. in STR - Auth Paths
1. Checking Inclusion - Verify Auth Path
2. Non-Equivocation - STR History
2. Non-Equivocation - Clients see same STRS
2. Checking Non-Equivocation - Cross-Verification
Privacy Challenges in CONIKS
Main Performance Questions
CONIKS' Performance is Practical!
Conclusion
Taught by
USENIX
Related Courses
Internet History, Technology, and SecurityUniversity of Michigan via Coursera Sicherheit im Internet
openHPI أساسيات التشفير
Rwaq (رواق) Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera