Overview
Syllabus
Intro
Modern Crypto
The "Security Divide"
An Implicit Assumption
Implementations are Untrustworthy
Kleptography
RSA Key Generation
A Subverted Implementation
The Attack
The Threat of Klepto Attacks
Subliminal Channel Attack
Status-of-the-Art for Defending
Current Status: Wide Open
Long Term Goal
Cliptographic Model
The Model(s)
What Can the Watchdog Guarantee?
Mitigating Subliminal Channel
One-Way Permutation
Random Padding is Dangerous
Conventional Wisdom
FDH in the Clipto Setting
Revised FDH
Summary
Open Problems
Our Recent Progress: Signature with Offline Watchdog
Taught by
TheIACR