Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines

TheIACR via YouTube

Overview

Explore a 21-minute conference talk from Crypto 2016 on message transmission with reverse firewalls, presented by Yevgeniy Dodis, Ilya Mironov, and Noah Stephens-Davidowitz. Delve into the challenges of secure communication on corrupted machines, examining topics such as cryptographic software bugs, algorithm substitution attacks, and reverse firewall functionality. Learn about message-transmission protocols, perandomizable hybrid encryption, and composition theorems. Gain insights into the complexities of trusting computers in cryptographic operations and discover potential solutions for enhancing security in real-world scenarios.

Syllabus

Message Transmission with Secure Communication on Corrupted Machines
Should Alice Trust Her Computer?
Bugs in Cryptographic Software
of Hardware and Software
Crypto in the Real World?
Algorithm Substitution Attacks
Reverse Firewalls!
Reverse Firewall Functionality
Reverse Firewall Security
Simple Example
What if the firewall is corrupt?
Primitives with Reverse Firewalls
Message-Transmission Protocols
Problems with Simple PKE Scheme
Perandomizable Hybrid Encryption?
Composition Theorem (Informal)
with a Secure Firewall
Open Questions

Taught by

TheIACR

Reviews

Start your review of Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.