About the series
Lecturer: Jonathan Katz, Assistant Professor at University of Maryland - College Park
Abstract
A key exposure attack is possibly one of the greatest threats to security in the real world. For one thing, such an attack typically implies that all security guarantees are lost; more importantly, a key exposure attack may be much easier in practice (depending on the application environment) than breaking the cryptographic assumptions on which a scheme is based. This is especially true as cryptographic algorithms are increasingly deployed on inexpensive, lightweight, and mobile devices.
Can anything be done to protect a system whose secret key has been exposed? Here, we discuss means to address this issue using key-evolving cryptosystems in which the secret key is updated at regular time periods and the damage caused by key exposure is contained (as much as possible) to a limited interval of time. We describe various definitions of security within this paradigm, and show a number of provably-secure cryptographic constructions.
About the Lecturer:
Jonathan Katz received bachelors degrees in Chemistry and Mathematics from the Massachusetts Institute of Technology in 1996. After a brief stint as a chemist, he entered the Computer Science department at Columbia University from which he obtained his PhD (with distinction) in 2002 under the supervision of Moti Yung and Zvi Galil. Later that year, he joined the Department of Computer Science at the University of Maryland (Collegex> Park), where he is currently an assistant professor. His research interests lie broadly in the areas of cryptography as well as security for distributed systems. s as co-editor-in-chief of the new International Journal on Information Security.
**The Information Science Institute of the University of Southern California has also agreed to provide a downloadable version of this presentation. **
** The downloadable link will be made available shortly after the presentation **
Webcast Link
*Alternate Link, please copy and paste the following URL into your browser location bar Real.com or click on the links below to download the player.
You can download and install the FREE version of RealPlayer 8 Basic from Download.com: Macintosh | Windows (All versions)
Abstract
A key exposure attack is possibly one of the greatest threats to security in the real world. For one thing, such an attack typically implies that all security guarantees are lost; more importantly, a key exposure attack may be much easier in practice (depending on the application environment) than breaking the cryptographic assumptions on which a scheme is based. This is especially true as cryptographic algorithms are increasingly deployed on inexpensive, lightweight, and mobile devices.
Can anything be done to protect a system whose secret key has been exposed? Here, we discuss means to address this issue using key-evolving cryptosystems in which the secret key is updated at regular time periods and the damage caused by key exposure is contained (as much as possible) to a limited interval of time. We describe various definitions of security within this paradigm, and show a number of provably-secure cryptographic constructions.
About the Lecturer:
Jonathan Katz received bachelors degrees in Chemistry and Mathematics from the Massachusetts Institute of Technology in 1996. After a brief stint as a chemist, he entered the Computer Science department at Columbia University from which he obtained his PhD (with distinction) in 2002 under the supervision of Moti Yung and Zvi Galil. Later that year, he joined the Department of Computer Science at the University of Maryland (Collegex> Park), where he is currently an assistant professor. His research interests lie broadly in the areas of cryptography as well as security for distributed systems. s as co-editor-in-chief of the new International Journal on Information Security.
**The Information Science Institute of the University of Southern California has also agreed to provide a downloadable version of this presentation. **
** The downloadable link will be made available shortly after the presentation **
Webcast Link
*Alternate Link, please copy and paste the following URL into your browser location bar Real.com or click on the links below to download the player.
You can download and install the FREE version of RealPlayer 8 Basic from Download.com: Macintosh | Windows (All versions)