Automating the Development of Chosen Ciphertext Attacks

Automating the Development of Chosen Ciphertext Attacks

TheIACR via YouTube Direct link

Automating the Development of Chosen Ciphertext Attacks

1 of 17

1 of 17

Automating the Development of Chosen Ciphertext Attacks

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Automating the Development of Chosen Ciphertext Attacks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Automating the Development of Chosen Ciphertext Attacks
  2. 2 Format oracles
  3. 3 What about AE? Of course we know how to mitigate these issues
  4. 4 High-level approach
  5. 5 Basic approach
  6. 6 Theory solvers: Good/bad
  7. 7 Define initial constraints
  8. 8 Step 2: Identify experiment (toy)
  9. 9 Conduct experiment
  10. 10 Add new constraint
  11. 11 Repeat / Solve
  12. 12 Approximate counting
  13. 13 Step 2: revised
  14. 14 PKCS #7 padding: machine
  15. 15 Human vs. machine
  16. 16 Example 2: Bitwise padding Developed a new bitwise-padding scheme
  17. 17 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.