Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Downgrade Resilience in Key-Exchange Protocols

IEEE via YouTube

Overview

Explore downgrade resilience in key-exchange protocols through this 20-minute IEEE conference talk presented at the 2016 IEEE Symposium on Security & Privacy. Delve into the challenges of configurable protocols like TLS, SSH, IPsec, and ZRTP, and learn how to support configurability while ensuring the negotiation of preferred modes. Examine the causes of downgrade attacks, survey existing standards' downgrade resilience, and understand the concept of downgrade security. Discover design patterns that guarantee downgrade security and how they can be applied to strengthen existing protocols, including the draft of TLS 1.3. Gain insights into transcript authentication, downgrade-secure configurations, and protocol execution models for analyzing complex real-world protocols.

Syllabus

Intro
Downgrade as an everyday phenomen
Negotiation
Transcript authentication vs. Downgrades
Downgrade secure configurations
Protocol execution model
Reducing complex real-world protocol analysis
Downgrade security of TLS 1.3
Downgrade Resilience in key Exchange

Taught by

IEEE Symposium on Security and Privacy

Reviews

Start your review of Downgrade Resilience in Key-Exchange Protocols

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.