Overview
This course provides a formal treatment of key confirmation in key exchange protocols and its implications for TLS 1.3. The learning outcomes include understanding the importance of key confirmation, different levels of key confirmation, and applying rigorous security definitions to protocol designs. The course teaches the skills of formalizing key confirmation, analyzing security properties of handshake messages, and transforming protocols to enhance key confirmation guarantees. The teaching method involves theoretical discussions, protocol analysis, and practical design considerations. The intended audience for this course includes cybersecurity professionals, protocol designers, and individuals interested in cryptographic protocols and network security.
Syllabus
Intro
Key Confirmation
Why Care
What We Do
Full Key Confirmation
Almost Full Key Confirmation
Transform Protocol
Key Confirmation Protocol
Summary
Taught by
IEEE Symposium on Security and Privacy