@@ -7,7 +7,7 @@ \section{About cryptology}
7
7
8
8
\begin {frame }{Proofs of security are fundamental: Reduction proofs}
9
9
\small
10
- Proof by reduction to a well-known mathematical problem or existing cryptographic construction.
10
+ Proof by reduction to a well-known mathematical problem \emph { assumed to be hard } or existing cryptographic construction \emph { assumed to be secure } .
11
11
\vfill
12
12
\textbf {If } an attack against my cryptosystem exists,
13
13
\\ \textbf {then } this other cryptosystem can be attacked or this math problem can be solved.
@@ -31,7 +31,7 @@ \section{About cryptology}
31
31
$$ F : K \times D \to C$$
32
32
33
33
\begin {description }
34
- \item [$ K$ ] Key material; secret information held by all parties
34
+ \item [$ K$ ] Key material; secret information held by the trusted parties
35
35
\item [$ D$ ] Protected information
36
36
\item [$ C$ ] Leaked information; any information known to the attacker after protocol execution
37
37
\end {description }
@@ -40,15 +40,15 @@ \section{About cryptology}
40
40
every value of the protected information is equally plausible.
41
41
42
42
43
- $$ \forall c : C, d_1 : D, d_2 : D; |\{ k \in K | F(k, d_1 ) = c \} | = |\{ k \in K | F(k, d_ 1 ) = c \} |$$
43
+ $$ \forall c : C, d_1 : D, d_2 : D; |\{ k \in K | F(k, d_1 ) = c \} | = |\{ k \in K | F(k, d_ 2 ) = c \} |$$
44
44
\end {frame }
45
45
46
46
\begin {frame }{Proofs are fundamental: Implementation security}
47
47
\begin {columns }[t,fullwidth]
48
48
49
49
\begin {column }{.40\textwidth }
50
50
\begin {block }{Functional Correctness}
51
- Using formal methods from computer science that a cryptographic implementation is equivalent to its specification.
51
+ Using formal methods from computer science that a cryptographic implementation is functionally equivalent to its specification.
52
52
\end {block }
53
53
54
54
\vfill
@@ -88,9 +88,11 @@ \section{About cryptology}
88
88
\end {frame }
89
89
90
90
91
- \begin {frame }{Open-Source \& Open-Science are mandatory }
91
+ \begin {frame }{Implementations and specifications must be open }
92
92
% TODO(marei): Can we render this as full-size background image
93
93
\includegraphics {graphics-repo/misc/kryptoparty.jpg}
94
+
95
+ % TODO(karolin): Copy/paste kerkoffs principle
94
96
\end {frame }
95
97
96
98
\begin {frame }{Open-Source \& Open-Science are mandatory}
0 commit comments