COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Security Seminar > Anti-surveillance: Can Applied Cryptography, Law Enforcement, and Formal Methods be Friends?
Anti-surveillance: Can Applied Cryptography, Law Enforcement, and Formal Methods be Friends?Add to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Laurent Simon. Abstract: In recent decades, intelligence, law-enforcement, business, and political organizations have developed a growing dependence on data. In the words of the NSA there is a desire to ‘sniff it all, collect it all, know It all, process it all, exploit it all’. Edward Snowden claimed that cryptography has a unique role in preventing this excessive collection. But what kind of cryptography has seen an increase in deployment? Which is still floundering and for what reasons? I will look at these questions by relating them to two of my research interests: anonymous credentials and the TLS protocol.
These two areas are very different, but they both feed into fears of law enforcement of ‘going dark’ and new calls for key escrow. I will argue that a principled stance on preventing key escrow and trapdoors backed up by formal and cryptographic analysis is necessary to prevent slipping back into the routine subversion of cryptographic protections of the pre-Snowden days. At the same time, I offer a compromise: A novel mechanism that enables targeted surveillance while enforcing hard limitations on its scope in a publicly verifiable way. Bio: Dr. Markulf Kohlweiss is a researcher at Microsoft Research Cambridge in the Programming Principles and Tools group. He did his PhD at the COSIC (Computer Security and Industrial Cryptography) group at the K.U. Leuven, and his master thesis at IBM Research Zurich. Dr. Kohlweiss’ research focus is on privacy-enhancing cryptography and formal reasoning about cryptographic protocols. More specifically, he examines the interplay of cryptography and real-world security systems through collaborative projects on verifiable computation and SSL /TLS. For the latter he is a co-recipient of the Levchin Prize awarded to the miTLS team. This talk is part of the Computer Laboratory Security Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsNanoscience Centre Seminar Series Featured talks Department of Computer Science and Technology talks and seminars TCM Blackboard Series Biocomputing Workshops Philomathia Social Sciences Research ProgrammeOther talksIntrinsically Motivating Teachers;STIR's use of Data Driven Insight to Iterate, Pivot and (where necessary) Fail Fast Simulating Neutron Star Mergers The Design of Resilient Engineering Infrastructure Systems with Bayesian Networks Mental Poker Renationalisation of the Railways. A CU Railway Club Public Debate. Biological and Clinical Features of High Grade Serous Ovarian Cancer |