Constructing Cryptographic Protocols

Presented at HOPE Number Six (2006), July 22, 2006, 7 p.m. (60 minutes).

This lecture will show how to construct advanced cryptographic protocols. Beginning with a set of requirements for a communications protocol that includes immunity from replay attacks, traffic analysis resistance, and resiliency against partial compromise, the audience will be shown how a naive protocol can be iteratively improved into a protocol satisfying those requirements.


Presenters:

  • J. Salvatore Testa II
    J. Salvatore Testa II is a member of Hacktivismo, a human rights and technology group that fulfills a critical component of the Cult of the Dead Cow triumvirate. He is a computer security consultant and a graduate student studying computer security and information assurance at the Rochester Institute of Technology. It is rumored that J. Salvatore once hacked Chuck Norris' computer.

Links:

Similar Presentations: