Presented at
HOPE Number Six (2006),
July 22, 2006, 7 p.m.
(60 minutes).
This lecture will show how to construct advanced cryptographic protocols. Beginning with a set of requirements for a communications protocol that includes immunity from replay attacks, traffic analysis resistance, and resiliency against partial compromise, the audience will be shown how a naive protocol can be iteratively improved into a protocol satisfying those requirements.
Presenters:
-
J. Salvatore Testa II
J. Salvatore Testa II is a member of Hacktivismo, a human rights and technology group that fulfills a critical component of the Cult of the Dead Cow triumvirate. He is a computer security consultant and a graduate student studying computer security and information assurance at the Rochester Institute of Technology. It is rumored that J. Salvatore once hacked Chuck Norris' computer.
Links:
Similar Presentations: