Главная
Study mode:
on
1
Intro
2
Authenticated Key Exchange
3
Motivating Questions (TLS 1.3)
4
The SIGMAC Compiler
5
On the value sid
6
Subtleties
7
Treplication Security Definition
8
Treplication-Secure Protocols
9
Signing server's identity
10
Post-Handshake Client Authentication
11
Methodology: Functional Security
12
Encrypted CSM
13
Summary
Description:
Explore a comprehensive conference talk on key exchange authentication presented at CCS 2016. Delve into the SIGMAC compiler for unilateral-to-mutual authentication, its applications in TLS 1.3 client authentication, and the concept of treplication security. Examine motivating questions, subtleties in implementation, and the methodology of functional security. Learn about post-handshake client authentication, encrypted CSM, and gain insights into signing server identity. This 35-minute presentation by Hugo Krawczyk from IBM Research offers a deep dive into advanced cryptographic concepts and their practical applications in secure communications.

A Unilateral-to-Mutual Authentication Compiler for Key Exchange - with Applications to Client Authentication in TLS 1.3

Association for Computing Machinery (ACM)
Add to list
0:00 / 0:00