Overview
Explore the intricacies of symmetric designs and leakage-resilience in cryptography through this 56-minute conference talk. Delve into topics such as round functions, key scheduling, and the importance of middle layers in cryptographic designs. Examine password hashing techniques and the compactness of hashing modes. Investigate leakage resilience, including various leakage models and dense leakage scenarios. Learn about the simulation paradigm and its role in cryptographic security. Gain insights into the "Mother of All Leakages" concept and its implications for cryptographic systems. Engage with question and answer sessions throughout the talk to deepen your understanding of these critical aspects of modern cryptography.
Syllabus
Intro
Motivation
Mode
Round Function
Key Schedule
Questions
Mind the Middle Layer
Question
Password hashing
Compactness of hashing modes
Leakage resilience
PvP
Conclusion
Question Answer
The Mother of All Leakages
Leakage
Leakage Models
Dense Leakage
Simulation Paradigm
Recap
Taught by
TheIACR