Message Transmission with Secure Communication on Corrupted Machines
2
Should Alice Trust Her Computer?
3
Bugs in Cryptographic Software
4
of Hardware and Software
5
Crypto in the Real World?
6
Algorithm Substitution Attacks
7
Reverse Firewalls!
8
Reverse Firewall Functionality
9
Reverse Firewall Security
10
Simple Example
11
What if the firewall is corrupt?
12
Primitives with Reverse Firewalls
13
Message-Transmission Protocols
14
Problems with Simple PKE Scheme
15
Perandomizable Hybrid Encryption?
16
Composition Theorem (Informal)
17
with a Secure Firewall
18
Open Questions
Description:
Explore a 21-minute conference talk from Crypto 2016 on message transmission with reverse firewalls, presented by Yevgeniy Dodis, Ilya Mironov, and Noah Stephens-Davidowitz. Delve into the challenges of secure communication on corrupted machines, examining topics such as cryptographic software bugs, algorithm substitution attacks, and reverse firewall functionality. Learn about message-transmission protocols, perandomizable hybrid encryption, and composition theorems. Gain insights into the complexities of trusting computers in cryptographic operations and discover potential solutions for enhancing security in real-world scenarios.
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines