Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a 21-minute conference talk from Crypto 2016 on message transmission with reverse firewalls, presented by Yevgeniy Dodis, Ilya Mironov, and Noah Stephens-Davidowitz. Delve into the challenges of secure communication on corrupted machines, examining topics such as cryptographic software bugs, algorithm substitution attacks, and reverse firewall functionality. Learn about message-transmission protocols, perandomizable hybrid encryption, and composition theorems. Gain insights into the complexities of trusting computers in cryptographic operations and discover potential solutions for enhancing security in real-world scenarios.
Syllabus
Message Transmission with Secure Communication on Corrupted Machines
Should Alice Trust Her Computer?
Bugs in Cryptographic Software
of Hardware and Software
Crypto in the Real World?
Algorithm Substitution Attacks
Reverse Firewalls!
Reverse Firewall Functionality
Reverse Firewall Security
Simple Example
What if the firewall is corrupt?
Primitives with Reverse Firewalls
Message-Transmission Protocols
Problems with Simple PKE Scheme
Perandomizable Hybrid Encryption?
Composition Theorem (Informal)
with a Secure Firewall
Open Questions
Taught by
TheIACR