Overview
Explore a comprehensive analysis of authenticated encryption robustness in this 24-minute conference talk presented at Crypto 2017. Delve into the deployment of GCM, learn about exploiting already deployed algorithms, and understand the research motivation behind enhancing encryption security. Examine NonSmiths Resistance and Security, investigate potential attacks, and gain insights into Nonce Misuse Resilience. Conclude by exploring the concept of Unverified Plain Text, providing a thorough overview of cutting-edge developments in cryptographic security.
Syllabus
Intro
Deployment of GCM
Exploiting already deployed algorithms
Research Motivation
NonSmiths Resistance
NonSmiths Security
Attacks
Nonce Misuse Resilience
Unverified Plain Text
Taught by
TheIACR