Overview
Explore the strengths and limitations of applied homomorphic encryption in this informative talk. Delve into the workings of RSA encryption and discover a critical pitfall it faces, which homomorphic encryption aims to address. Gain insights into these encryption models through the lens of the Confidentiality-Integrity-Availability (CIA) Triad. Learn about basic communication, local encryption, data usage, and the concept of homomorphism in cryptography. Examine practical examples, including search functionality in encrypted data, and understand the implications for data integrity. Enhance your understanding of this largely theoretical yet promising field in modern cryptography.
Syllabus
Intro
Basic Communication
Solution: Encryption
Threat Model 2
Local Encryption
Using the Data
What do we want
Homowhatism
Some Examples
Intuition
Open the Country Gates
Example: Search
Final Encryption
What about Integrity?
Questions?
Taught by
White Hat Cal Poly