Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Malicious Cryptography: Beyond Adhering to Specifications in Secure Systems - ICBS 2024

BIMSA via YouTube

Overview

Explore the concept of "Malicious Cryptography" in this comprehensive lecture by Moti Yung at ICBS2024. Delve into how cryptographic systems can be redirected and repurposed beyond their initial specifications, sometimes contradicting their intended use. Examine case studies including the breaking of fielded Escrow Encryptions and the prediction of Ransomware with its countermeasures. Investigate systematic treatments of repurposed cryptographic systems, covering topics such as Kleptography, Post Snowden Cryptography, and Anamorphic Encryption. Gain insights into the challenges of careless cryptography use and design, as well as the limitations imposed by adversarial bodies in the "Crypto Wars". Learn how these concepts have evolved over the past three decades and their implications for modern cryptographic systems.

Syllabus

Moti Yung: Malicious Cryptography: beyond adhering to specifications in secure systems #ICBS2024

Taught by

BIMSA

Reviews

Start your review of Malicious Cryptography: Beyond Adhering to Specifications in Secure Systems - ICBS 2024

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.