Overview
Explore the intersection of cryptography and cloud computing in this 47-minute conference talk. Delve into topics such as searchable encryption, systemwide security, and the Swiss Army knife of cryptography. Gain insights into JSON Web Tokens (JWT), including their functionality and potential vulnerabilities. Examine cloud storage systems, key metadata, and the process of vulnerability discovery. Learn about the various components that contribute to secure cloud infrastructure and the challenges faced in maintaining data privacy and integrity in cloud environments.
Syllabus
Introduction
Searchable Encryption
Systemwide Security
Swissa
Summary
JWT
How JWT works
Weaknesses
All Keys
Pieces
Questions
Vulnerability discovery
Key metadata
Cloud storage systems
Taught by
TheIACR