Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate

IEEE via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of the TLS 1.3 Draft-18 protocol in this IEEE Symposium on Security & Privacy conference talk. Delve into the clean-slate design of TLS 1.3, examining its ability to prevent legacy problems and potential vulnerabilities. Learn about the methodology for developing verified symbolic and computational models of TLS 1.3 alongside a high-assurance reference implementation. Discover how ProVerif models are used to evaluate various TLS 1.3 versions against known and previously unpublished vulnerabilities. Examine the computational CryptoVerif model for TLS 1.3 Draft-18 and its security proofs. Investigate RefTLS, an interoperable implementation of TLS 1.0-13, and its automatic analysis through ProVerif model extraction from typed JavaScript code. Gain insights into recent attacks on legacy crypto in TLS, modeling weak crypto in ProVerif, and writing and verifying security goals for TLS 1.3.

Syllabus

Intro
Transport Layer Security (TLS) 1.3
Our Approach
Recent Attacks on Legacy Crypto in TLS
Modeling Weak Crypto in ProVerif
Modeling TLS 1.3 in ProVerif
Writing and Verifying Security Goals
Cryptographic Assumptions for TLS 1.3
More Unusual Proof Assumptions
Manual Proof of Composition for full TLS 1.3
RefTLS: A Reference TLS Implementation
RefTLS Architecture
Results and Limitations

Taught by

IEEE Symposium on Security and Privacy

Reviews

Start your review of Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.