Explore the concept of "Malicious Cryptography" in this comprehensive lecture by Moti Yung at ICBS2024. Delve into how cryptographic systems can be redirected and repurposed beyond their initial specifications, sometimes contradicting their intended use. Examine case studies including the breaking of fielded Escrow Encryptions and the prediction of Ransomware with its countermeasures. Investigate systematic treatments of repurposed cryptographic systems, covering topics such as Kleptography, Post Snowden Cryptography, and Anamorphic Encryption. Gain insights into the challenges of careless cryptography use and design, as well as the limitations imposed by adversarial bodies in the "Crypto Wars". Learn how these concepts have evolved over the past three decades and their implications for modern cryptographic systems.
Overview
Syllabus
Moti Yung: Malicious Cryptography: beyond adhering to specifications in secure systems #ICBS2024
Taught by
BIMSA