|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
TLS Security - Where Do We Stand?
If you have a question about this talk, please contact Laurent Simon.
Abstract: TLS is the de facto secure protocol of choice on the Internet. In this talk, I’ll give an overview of the state-of-the-art of TLS security, focusing mostly on the TLS Record Protocol which is responsible for providing the basic secure channel functionality in TLS . I’ll focus on recently-discovered vulnerabilities in the TLS specification and its cryptographic algorithms. These lead to plaintext recovery attacks against TLS -protected traffic. I will reflect on why the deployment of secure cryptography is seemingly so hard, and what the barriers are to adopting better approaches than the current techniques used in TLS .
Bio: Professor Kenny Paterson obtained his BSc (Hons) in 1990 from the University of Glasgow and a PhD from the University of London in 1993, both in Mathematics. He was a Royal Society Fellow at the Swiss Federal Institute of Technology, Zurich, from 1993 to 1994 and a Lloyd’s of London Tercentenary Foundation Fellow at the University of London from 1994 to 1996. He joined Hewlett-Packard Laboratories in 1996, becoming project manager in 1999. His technical work there involved him in international standards setting, internal consultancy on a wide range of mathematical and cryptographic subjects, and intellectual property generation. He also continued with more academic activities. In 2001, Kenny re-joined Royal Holloway as a Lecturer, becoming Reader in 2002 and Professor in 2004. He led the ISG ’s participation in the MoD/DoD-funded International Technology Alliance from 2006 to 2011. In March 2010, Kenny commenced a 5-year research fellowship funded by EPSRC on the topic of “Cryptography: Bridging Theory and Practice”. He was Program Chair for Eurocrypt 2011 and serves on the editorial board of the Journal of Cryptology. Kenny’s research interests span a wide range of topics in theoretical and applied cryptography, and information security. He has published more than 120 research papers on these topics.
This talk is part of the Computer Laboratory Security Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsMilton 400th Anniversary Lectures Type the title of a new list here BPI Seminar Series
Other talksNew Directions in Anonymization: Permutation Paradigm, Verifiability by Subjects and Intruders, Transparency to Users Architectures of Law: Courts, Space and Legal Legitimacy How habits become compulsions? Investigating habit perseveration in Obsessive-Compulsive Disorder. G₂–instantons over twisted connected sums The Science of Pain and its Management 2016 Annual General Meeting