Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Cliptography - Clipping the Power of Kleptographic Attacks

TheIACR via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of Cliptography and its role in mitigating kleptographic attacks in this Asiacrypt 2016 conference talk. Delve into the security divide in modern cryptography and the implicit assumption of trustworthy implementations. Examine the threat of kleptography, including subverted RSA key generation and subliminal channel attacks. Learn about the current state of defenses against these threats and the long-term goals of the cliptographic model. Investigate the limitations of conventional wisdom regarding random padding and discover a revised Full Domain Hash (FDH) approach in the cliptographic setting. Conclude with a summary of open problems and recent progress in developing signatures with offline watchdog capabilities.

Syllabus

Intro
Modern Crypto
The "Security Divide"
An Implicit Assumption
Implementations are Untrustworthy
Kleptography
RSA Key Generation
A Subverted Implementation
The Attack
The Threat of Klepto Attacks
Subliminal Channel Attack
Status-of-the-Art for Defending
Current Status: Wide Open
Long Term Goal
Cliptographic Model
The Model(s)
What Can the Watchdog Guarantee?
Mitigating Subliminal Channel
One-Way Permutation
Random Padding is Dangerous
Conventional Wisdom
FDH in the Clipto Setting
Revised FDH
Summary
Open Problems
Our Recent Progress: Signature with Offline Watchdog

Taught by

TheIACR

Reviews

Start your review of Cliptography - Clipping the Power of Kleptographic Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.