Theory of cryptography | Cryptography

Concrete security

In cryptography, concrete security or exact security is a practice-oriented approach that aims to give more precise estimates of the computational complexities of adversarial tasks than polynomial equivalence would allow. It quantifies the security of a cryptosystem by bounding the probability of success for an adversary running for a fixed amount of time. Security proofs with precise analyses are referred to as concrete. Traditionally, provable security is asymptotic: it classifies the hardness of computational problems using polynomial-time reducibility. Secure schemes are defined to be those in which the advantage of any computationally bounded adversary is negligible. While such a theoretical guarantee is important, in practice one needs to know exactly how efficient a reduction is because of the need to instantiate the security parameter - it is not enough to know that "sufficiently large" security parameters will do. An inefficient reduction results either in the success probability for the adversary or the resource requirement of the scheme being greater than desired. Concrete security parametrizes all the resources available to the adversary, such as running time and memory, and other resources specific to the system in question, such as the number of plaintexts it can obtain or the number of queries it can make to any oracles available. Then the advantage of the adversary is upper bounded as a function of these resources and of the problem size. It is often possible to give a lower bound (i.e. an adversarial strategy) matching the upper bound, hence the name exact security. (Wikipedia).

Video thumbnail

Network Security, Part 1 : Basic Encryption Techniques

Fundamental concepts of network security are discussed. It provides a good overview of secret Key and public key Encryption. Important data encryption standards are presented.

From playlist Network Security

Video thumbnail

Intrusion Detection: Part 2

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Transport Layer Security: Part 1

Fundamental concepts of TLS are discussed. SSL is analyzed. HTTPS & SSH are presented.

From playlist Network Security

Video thumbnail

Network Security: Classical Encryption Techniques

Fundamental concepts of encryption techniques are discussed. Symmetric Cipher Model Substitution Techniques Transposition Techniques Product Ciphers Steganography

From playlist Network Security

Video thumbnail

Intrusion Detection: Part 1

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Transport Layer Security: Part 2 - TLS & HTTPS

Fundamental concepts of TLS are discussed. SSL is analyzed. HTTPS & SSH are presented.

From playlist Network Security

Video thumbnail

What do we mean by device security? Why should we care about this?

Keep your smart devices safe! Learn what device security is, and how it protects your phones, tablets, and computers from being accessed and exploited by cybercriminals.

From playlist Internet Safety

Video thumbnail

Firmware Security: Why It Matters and How You Can Have It

A system is only as secure as the least secure component it depends on. Hardening the kernel is a vital part of developing a secure operating system, but if the firmware underneath the kernel is insecure then attackers have an opportunity to sidestep your security and compromise you anyway

From playlist Security

Video thumbnail

IP Security: Part 1

Fundamental concepts of IPSec are discussed. Authentication Header is explained. ESP & IKE are analyzed.

From playlist Network Security

Video thumbnail

DeepSec 2010: Circumventing common Pitfalls when auditing sourcecode for Security Vulnerabilities

Thanks to the DeepSec organisation for making these videos available and let me share the videos on YouTube. Speakers: Aljosha Judmaier | David White, SEC Consult There comes the time where a true security expert has to look at some source code. Everybody knows that ----real men---- use

From playlist DeepSec 2010

Video thumbnail

MPC in the Head With Applications to Blockchain (Lecture 2) by Carmit Hazay

DISCUSSION MEETING : FOUNDATIONAL ASPECTS OF BLOCKCHAIN TECHNOLOGY ORGANIZERS : Pandu Rangan Chandrasekaran DATE : 15 to 17 January 2020 VENUE : Madhava Lecture Hall, ICTS, Bangalore Blockchain technology is among one of the most influential disruptive technologies of the current decade.

From playlist Foundational Aspects of Blockchain Technology 2020

Video thumbnail

Stanford Seminar - Protecting Patient Privacy in Genomic Analysis

One of the challenges for patients with rare diseases is the lack of local data to use for analysis. As a result, patients are having to rely on 3rd party facilities to carry out the computations based on data collected around the globe. But due to patient privacy concerns, as well as heav

From playlist Stanford Seminars

Video thumbnail

DeepSec 2011: Do They Deliver? - Practical Security and Load Testing of Cloud Service Providers

Speaker: Matthias Luft | Enno Rey Matthias Luft talks at the DeepSec 2011 conference about cloud service providers and cloud security: The rapid evolution of cloud based computing is often used to illustrate a possible paradigm shift in computing. The centralized processing and storing

From playlist DeepSec 2011

Video thumbnail

CERN checks Particle Physics Anomaly, A New Explanation for the Interstellar Object 'Oumuamua & More

Check out Ground News to raise your news reading to a higher level: https://ground.news/sabine Correction to what I say at 9:45 -- That should have been *billions* of course, not millions! Sorry about that. Today we’ll talk a new explanation for the interstellar object Oumuamua, what’s u

From playlist Weekly Science News

Video thumbnail

Secure computation with RAMs - Dr Mariana Raykova, Yale University

Secure computation with RAMs: revisiting square root ORAM and low leakage secure Boolean queries Hiding memory access patterns is required for secure computation, but remains prohibitively expensive for many interesting applications. This talk presents two works addressing this question:

From playlist Turing Seminars

Video thumbnail

The Engineering Behind Disney's Floating Mountains

A look at the design and construction of Disney’s floating mountains located within Pandora – The World of Avatar. Support Art of Engineering on Patreon: https://www.patreon.com/ArtofEngineering Shop Art of Engineering Merchandise: https://teespring.com/stores/ArtofEngineering Twitter:

From playlist Theme Park Engineering

Video thumbnail

Himmler's Mini-Wolf's Lair - SS Hochwald

Near the Wolf's Lair in present-day Poland are the ruins of Hochwald, Himmler's forgotten SS headquarters for the Eastern Front. Discover the history of this most secret site. Special thanks to Mike Muzik for Hochwald footage - please visit his channel for more footage of German command f

From playlist Trains

Video thumbnail

UK: British Hollywood - A New Studio (1927)

EMPIRE NEWS NEWSREEL (REUTERS) To license this film, visit https://www.britishpathe.com/video/VLVACGLZO91R6FZQXDK0C58BGM7Q4-RTV A British Hollywood! The world's largest concrete building secured for production of British films. The man behind? Full Description: ENGLAND, UK A British

From playlist EMPIRE NEWS NEWSREEL (REUTERS)

Video thumbnail

4 Myths About Construction Debunked

Let's set the record straight for a few construction misconceptions! Errata: The shot at 4:16 is of the Greek Acropolis (not a Roman structure). Over the past 6 years of reading emails and comments from people who watch Practical Engineering, I know that parts of heavy construction are c

From playlist Civil Engineering

Related pages

Security parameter | Polynomial-time reduction | Provable security | Formal verification | Computationally bounded adversary | Lattice-based cryptography | Digital signature | Pseudorandom generator | RSA (cryptosystem) | ElGamal encryption | Rabin cryptosystem | Adversary (cryptography) | Block cipher mode of operation | Cryptography | Probability | Coq