Cryptography Primer Session 5 Attacks, Vulnerabilities, & Practical Considerations

This will be the fifth of six cryptography primer sessions exploring the basics of modern cryptography. In this session, we’ll explore a variety of attacks including padding attacks, length-extension attacks, fault-injection attacks, timing attacks, and cache attacks. In doing so, we’ll explore some of the practical considerations which create the vulnerabilities that enable these attacks. The final session (on May 30) is expected to focus on applications including zero-knowledge, secret sharing, homomorphic encryption, and election protocols.

Speaker Details

Josh Benaloh is Senior Cryptographer at Microsoft Research. He earned his S.B. degree at M.I.T. and M.S., M. Phil., and Ph.D. degrees at Yale University where his doctoral dissertation Verifiable Secret-Ballot Elections made the first substantive use of homomorphic encryption techniques and introduced a new paradigm for achieving election integrity. Josh serves as an elected director of the International Association for Cryptologic Research and an editor of the Journal of Election Technologies and Systems. He also serves on Microsoft’s Crypto Board and its PKI Working Group and in his copious spare time serves as Chair of Sound Transit’s Citizen Oversight Panel.

Date:
Speakers:
Josh Benaloh
Affiliation:
Microsoft

Series: Microsoft Research Talks