Crypto at the Time of Surveillance: Sharing with the Cloud

Please use this identifier to cite or link to this item: http://hdl.handle.net/10045/40384
Información del item - Informació de l'item - Item information
Title: Crypto at the Time of Surveillance: Sharing with the Cloud
Authors: Yung, Moti
Keywords: Cryptography | Cloud
Knowledge Area: Ciencia de la Computación e Inteligencia Artificial
Issue Date: Sep-2014
Publisher: Universidad de Alicante
Citation: Actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información : celebrado del 5 al 8 de septiembre 2014, Alicante
Abstract: These days as we are facing extremely powerful attacks on servers over the Internet (say, by the Advanced Persistent Threat attackers or by Surveillance by powerful adversary), Shamir has claimed that “Cryptography is Ineffective”and some understood it as “Cryptography is Dead!” In this talk I will discuss the implications on cryptographic systems design while facing such strong adversaries. Is crypto dead or we need to design it better, taking into account, mathematical constraints, but also systems vulnerability constraints. Can crypto be effective at all when your computer or your cloud is penetrated? What is lost and what can be saved? These are very basic issues at this point of time, when we are facing potential loss of privacy and security.
URI: http://hdl.handle.net/10045/40384
ISBN: 978-84-9717-323-0
Language: eng
Type: info:eu-repo/semantics/conferenceObject
Peer Review: si
Appears in Collections:Congresos - RECSI 2014 - Comunicaciones

Files in This Item:
Files in This Item:
File Description SizeFormat 
ThumbnailRECSI-2014_01.pdf34,47 kBAdobe PDFOpen Preview


Items in RUA are protected by copyright, with all rights reserved, unless otherwise indicated.