Главная
Study mode:
on
1
Intro
2
Aim: formal verification of code
3
This talk: cryptographic primitives
4
Who did the proofs, anyway?
5
We do difficult proofs
6
Threat model for cryptographic primitives
7
So, verification is just fancy testing
8
Result-high confidence of this
9
Verifying cryptography is easy! (in some ways)
10
Conservation of difficulty rule
11
Why is it difficult to verify cryptography?
12
Verifying cryptography is difficult, as well
13
Changing the code is very powerful during formal verification!
14
Rewrites in practice (from SHA 384)
15
Composition has a cost
16
Cumulative Correctness planning
Description:
Explore formal verification of cryptographic libraries in this conference talk from Strange Loop 2022. Learn how mathematical reasoning can prove code security and bug-free status in real-world cryptographic systems. Discover the application of formal verification to production cryptography, its cost-effectiveness as an assurance tool, and lessons for securing other software systems. Delve into the threat model for cryptographic primitives, understand the challenges and benefits of verifying cryptography, and examine practical examples such as SHA 384 rewrites. Gain insights into cumulative correctness planning and the power of code changes during formal verification processes.

Formally Verifying Everybody's Cryptography

Strange Loop Conference
Add to list