Completed
Theory solvers: Good/bad
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Automating the Development of Chosen Ciphertext Attacks
Automatically move to the next video in the Classroom when playback concludes
- 1 Automating the Development of Chosen Ciphertext Attacks
- 2 Format oracles
- 3 What about AE? Of course we know how to mitigate these issues
- 4 High-level approach
- 5 Basic approach
- 6 Theory solvers: Good/bad
- 7 Define initial constraints
- 8 Step 2: Identify experiment (toy)
- 9 Conduct experiment
- 10 Add new constraint
- 11 Repeat / Solve
- 12 Approximate counting
- 13 Step 2: revised
- 14 PKCS #7 padding: machine
- 15 Human vs. machine
- 16 Example 2: Bitwise padding Developed a new bitwise-padding scheme
- 17 Summary