4 - Cryptographic Communications Protocols [ID:52958]
50 von 637 angezeigt

We start today with a very, very short overview of what we've seen so far and where we are

going.

We started with an introduction lecture that was mixed of many different ideas, aspects,

things that need to be repeated.

And the basic introduction contents were looking at different building blocks and assumptions,

looking at different types of definitions, and looking at what type of proofs we are

considering.

And so we basically looked at public key encryption and key encapsulation mechanisms.

We looked at definitions of indistinguishability of ciphertexts under chosen ciphertext attacks

And we looked at reduction based proofs and game based definitions and all those things

are the things that we use here.

There are many alternatives to that, but for such an introduction or for such a cryptography

course I think it is very easy to use those types of definitions, consider those pretty

simple building blocks.

But as we will move through that course here we will see there are more complicated building

blocks, other types of definitions and those types of definitions we've seen already in

the second lecture.

And we might also see different types of proof techniques, but the most important ones that

we will see are reduction based proofs.

In the second lecture we have tried to understand what the system behind defining security is,

what the methodology is.

And the most important thing that you should take away from that lecture was that we can

proceed in five steps to come up with a good definition and those five steps are

First thing is syntax.

What is the syntax again?

Very good.

Second step?

Correctness.

So basically trying to understand what the functionality guarantees should be, but with

only honest execution environment, nothing is evil, nothing is malicious, we just look

at the functionality guarantees if we wouldn't need to care about any type of security, any

type of attacks.

The third step?

Which consists of?

Sorry?

Yeah.

So the capabilities of the adversary, exactly.

So we call this the adversary capabilities.

That means we try to understand if we place our adversary in the, this is what you basically

said, if we place an adversary in a malicious setting, what can the adversary control?

What can the adversary do?

How far can the adversary manipulate how the victims behave?

One thing that the adversary can for example do or what typically the victims can't do

by themselves is fully choose what the format of the messages look like.

So there is encoding that the victims can't choose and so we just give full power to the

adversary choosing what the messages look like.

Typically the adversary is sitting on a network, can see all the cyber attacks, can see all

the public keys, can see all public information but also can manipulate traffic which means

changing cyber attacks and seeing the reaction which means that we give the adversary typically

a decryption oracle.

Zugänglich über

Offener Zugang

Dauer

01:34:14 Min

Aufnahmedatum

2024-05-13

Hochgeladen am

2024-05-14 11:26:31

Sprache

en-US

Einbetten
Wordpress FAU Plugin
iFrame
Teilen