PKC 2017 is proud to feature the two invited speakers below:
Recent Advances in Non-Malleable Cryptography
Vipul Goyal, Carnegie Mellon University
The field of non-malleable cryptography deals with designing techniques to defend against tampering attacks and man-in-the-middle attacks. This includes objects such as non-malleable commitments, encryption, and codes. This field has moved very rapidly in the last few years and a number of basic questions have been resolved. These developments have left a footprint even beyond cryptography to areas such as randomness extraction and complexity theory. I will survey some of these recent developments and put forward a number of exciting future directions.
Vipul is an Associate Professor in the Computer Science Department at Carnegie Mellon. He obtained his PhD from UCLA in 2009 and then was a researcher in the Cryptography and Complexity group at Microsoft Research India until joining Carnegie Mellon at the beginning of this year. Vipul is interested in various aspects of theoretical cryptography (and in theoretical computer science in general), and he is particularly well known for his work on concurrent security and on non-malleability. Vipul is recipient of several prizes and awards, including an ACM CCS Test of Time Award and a Google Outstanding Graduate Student Award, and he was nominated by the Forbes magazine as one of the "30 under 30" in the category science and healthcare in 2013.
The Evolution of Public Key Cryptography in SSL/TLS
Kenny Paterson, Royal Holloway
In this talk, I'll discuss public key cryptography in SSL and TLS, covering both attacks and positive security results. I'll begin with an overview of the SSL/TLS Handshake Protocol, an authenticated key exchange protocol, describing the different modes and some of the advanced features it supports (including renegotiation and resumption). I'll then discuss how RSA encryption is used in SSL/TLS, and revisit Bleichenbacher's attack and its recent reincarnation in the form of the DROWN attack. I'll also look at the damaging long-term effects of the inclusion of export-grade cryptography in SSL/TLS in the 1990s, covering the FREAK and LOGJAM attacks. I'll explain why Diffie-Hellman key exchange has gained popularity in SSL/TLS in recent years, and cover the deployment of elliptic curve cryptography in SSL/TLS. I'll also discuss how public key cryptography will operate in TLS 1.3, a major redesign of the protocol whose specification is nearing completion in the IETF.
Kenny is a Professor of Information Security at Royal Holloway. He obtained his Ph.D. from the University of London in 1993 and then spent some time at ETH Zurich, at Royal Holloway, and at Hewlett-Packard Laboratories Bristol, before returning back to Royal Holloway in 2001. Kenny is interested in the theory and practice of cryptography, and he is particularly well known for his work on analyzing deployed cryptographic systems and developing provably secure solutions to real-world cryptographic problems. He is co-founder of the Real World Cryptography series of workshops and co-chair of the irtf.org Crypto Forum Research Group. Kenny is recipient of several prizes and awards, including an ACM CCS Best Paper Award, a Google Distinguished Paper Award, and a PET Award for Outstanding Research in Privacy Enhancing Technologies.