Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Formally Verifying Everybody's Cryptography

Strange Loop Conference via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course aims to teach learners about the concept of formal verification and its application to cryptography in real-world systems. By using mathematical reasoning, students will learn how to ensure the security and correctness of cryptographic code. The course covers topics such as cryptographic primitives, difficult proofs, threat models, and the challenges of verifying cryptography. Through practical examples and discussions, students will understand how to apply formal verification techniques to enhance the security of software systems. The intended audience for this course includes software developers, cybersecurity professionals, and anyone interested in cryptography and formal methods.

Syllabus

Intro
Aim: formal verification of code
This talk: cryptographic primitives
Who did the proofs, anyway?
We do difficult proofs
Threat model for cryptographic primitives
So, verification is just fancy testing
Result-high confidence of this
Verifying cryptography is easy! (in some ways)
Conservation of difficulty rule
Why is it difficult to verify cryptography?
Verifying cryptography is difficult, as well
Changing the code is very powerful during formal verification!
Rewrites in practice (from SHA 384)
Composition has a cost
Cumulative Correctness planning

Taught by

Strange Loop Conference

Reviews

Start your review of Formally Verifying Everybody's Cryptography

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.