Download presentation
Presentation is loading. Please wait.
1
Crypto Theory and Security Practice David Wagner University of California at Berkeley
2
Theory: IND-CCA2, INT-CTXT IND-CCA2 = no attacker can distinguish between universes Confidentiality INT-CTXT = no attacker can forge a new ctext Integrity EkEk DkDk random DkDk Universe 1Universe 2
3
Practice: Layering Principles Application EkEk TCP/IP Application DkDk TCP/IP Network Design principle: Crypto layer should not make any assumptions about other layers
4
Practice: Layering Principles Application EkEk TCP/IP Application DkDk TCP/IP Network Design principle: Crypto layer should not make any assumptions about other layers, i.e., crypto should ensure security even if all other layers are malicious Interesting, this is just what IND-CCA2, INT-CTXT guarantee
5
More Precisely… Application randomize TCP/IP Application DkDk TCP/IP drop, re-order, duplicate Anything you can do with chosen-plaintext/ciphertext, you can do with less:
6
Summary Crypto theory is highly relevant to engineering practice Composition is where the action is Wanted: a theory of security for systems, not just crypto primitives
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.