Cryptography with Weak, Noisy, Leaky and Tempered Keys

Subscribers:
351,000
Published on ● Video Link: https://www.youtube.com/watch?v=h4MLCFwfdzo



Duration: 58:24
99 views
1


Traditionally, to achieve cryptographic security, we require that users generate long perfectly random keys, store them on a perfectly reliable and secure device, and perfectly shield this device to prevent an attacker from observing or tampering its internals. This talk will survey some of my recent work on achieving equally strong security guarantees under imperfect conditions, where some of the above assumptions may not hold. For example, this includes the use of biometrics as cryptographic keys. Such keys come from an unstructured (weak) source of randomness and each fresh scan of a biometric usually introduces some noise. It also includes virtually any scenario where a cryptographic scheme is executed on physical hardware, since such executions can often leak various side-channel information about their internals (e.g. timing information, radiation, acoustics etc.). More generally, this line of research explores the minimal conditions under which cryptographic security can be achieved.




Other Videos By Microsoft Research


2016-08-16We Will be Right With You: Managing Customers Expectations with Vague Promises and Cheap Talk
2016-08-16Information That Matters: Investigating Relevance of Entities in Social Media Networks
2016-08-16Efficient Bayesian Algorithmic Mechanism Design
2016-08-16Extreme Learning Machine: Learning Without Iterative Tuning
2016-08-16Extracting Knowledge from Networks: Rumors, Superstars, and Communities
2016-08-16Electrical Flows and Laplacian Systems: A New Tool for Graph Algorithms
2016-08-16Limit Theorems in Pseudorandomness and Learning Theory
2016-08-16Empirical Software Engineering, Version 2.0
2016-08-16A Master Bijection for Planar Maps, and Its Applications
2016-08-16Password-based Authenticated Key Exchange at the Cost of Diffie-Hellman
2016-08-16Cryptography with Weak, Noisy, Leaky and Tempered Keys
2016-08-16Electrical Flows and Laplacian Systems: A New Tool for Graph Algorithms
2016-08-16Broadcast Based Peer Review in Open Source Software Development Projects
2016-08-16Optimization under Uncertainty: Understanding the Correlation Gap
2016-08-16Computational Social Choice: Algorithmic, Strategic, and Combinatorial Aspects
2016-08-16Harvesting and Querying the World's Knowledge
2016-08-16The FT-Mollification Method
2016-08-16Getting More: How to Negotiate to Achieve Your Goals in the Real World
2016-08-16HPC Virtual Worlds: Experimental Black Hole Dynamics on Parallel Computers
2016-08-16Optimal Moment Estimation in Data Streams
2016-08-16Microsoft Health Tech Today: Patient-friendly Apps



Tags:
microsoft research