Cryptography with Weak, Noisy, Leaky and Tempered Keys
Traditionally, to achieve cryptographic security, we require that users generate long perfectly random keys, store them on a perfectly reliable and secure de...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Thailand under the topic 'สภาพอากาศ'.
About this video
Traditionally, to achieve cryptographic security, we require that users generate long perfectly random keys, store them on a perfectly reliable and secure device, and perfectly shield this device to prevent an attacker from observing or tampering its internals. This talk will survey some of my recent work on achieving equally strong security guarantees under imperfect conditions, where some of the above assumptions may not hold. For example, this includes the use of biometrics as cryptographic keys. Such keys come from an unstructured (weak) source of randomness and each fresh scan of a biometric usually introduces some noise. It also includes virtually any scenario where a cryptographic scheme is executed on physical hardware, since such executions can often leak various side-channel information about their internals (e.g. timing information, radiation, acoustics etc.). More generally, this line of research explores the minimal conditions under which cryptographic security can be achieved.
Video Information
Views
116
Total views since publication
Likes
1
User likes and reactions
Duration
58:24
Video length
Published
Aug 17, 2016
Release date
Quality
sd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.