Crypto at the Time of Surveillance: Sharing with the Cloud


Autoria(s): Yung, Moti
Data(s)

18/09/2014

18/09/2014

01/09/2014

Resumo

These days as we are facing extremely powerful attacks on servers over the Internet (say, by the Advanced Persistent Threat attackers or by Surveillance by powerful adversary), Shamir has claimed that “Cryptography is Ineffective”and some understood it as “Cryptography is Dead!” In this talk I will discuss the implications on cryptographic systems design while facing such strong adversaries. Is crypto dead or we need to design it better, taking into account, mathematical constraints, but also systems vulnerability constraints. Can crypto be effective at all when your computer or your cloud is penetrated? What is lost and what can be saved? These are very basic issues at this point of time, when we are facing potential loss of privacy and security.

Identificador

Actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información : celebrado del 5 al 8 de septiembre 2014, Alicante

978-84-9717-323-0

http://hdl.handle.net/10045/40384

Idioma(s)

eng

Publicador

Universidad de Alicante

Direitos

info:eu-repo/semantics/openAccess

Palavras-Chave #Cryptography #Cloud #Ciencia de la Computación e Inteligencia Artificial
Tipo

info:eu-repo/semantics/conferenceObject