Skip to content

Commit e753857

Browse files
committed
feat: Blipps comments
1 parent 3380409 commit e753857

File tree

2 files changed

+8
-6
lines changed

2 files changed

+8
-6
lines changed

2024-09-20-eacn/00200_about_cryptography.tex

+7-5
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ \section{About cryptology}
77

88
\begin{frame}{Proofs of security are fundamental: Reduction proofs}
99
\small
10-
Proof by reduction to a well-known mathematical problem or existing cryptographic construction.
10+
Proof by reduction to a well-known mathematical problem \emph{assumed to be hard} or existing cryptographic construction \emph{assumed to be secure}.
1111
\vfill
1212
\textbf{If} an attack against my cryptosystem exists,
1313
\\ \textbf{then} this other cryptosystem can be attacked or this math problem can be solved.
@@ -31,7 +31,7 @@ \section{About cryptology}
3131
$$F : K \times D \to C$$
3232

3333
\begin{description}
34-
\item[$K$] Key material; secret information held by all parties
34+
\item[$K$] Key material; secret information held by the trusted parties
3535
\item[$D$] Protected information
3636
\item[$C$] Leaked information; any information known to the attacker after protocol execution
3737
\end{description}
@@ -40,15 +40,15 @@ \section{About cryptology}
4040
every value of the protected information is equally plausible.
4141

4242

43-
$$\forall c : C, d_1 : D, d_2 : D; |\{ k \in K | F(k, d_1) = c \}| = |\{ k \in K | F(k, d_1) = c \}|$$
43+
$$\forall c : C, d_1 : D, d_2 : D; |\{ k \in K | F(k, d_1) = c \}| = |\{ k \in K | F(k, d_2) = c \}|$$
4444
\end{frame}
4545

4646
\begin{frame}{Proofs are fundamental: Implementation security}
4747
\begin{columns}[t,fullwidth]
4848

4949
\begin{column}{.40\textwidth}
5050
\begin{block}{Functional Correctness}
51-
Using formal methods from computer science that a cryptographic implementation is equivalent to its specification.
51+
Using formal methods from computer science that a cryptographic implementation is functionally equivalent to its specification.
5252
\end{block}
5353

5454
\vfill
@@ -88,9 +88,11 @@ \section{About cryptology}
8888
\end{frame}
8989

9090

91-
\begin{frame}{Open-Source \& Open-Science are mandatory}
91+
\begin{frame}{Implementations and specifications must be open}
9292
% TODO(marei): Can we render this as full-size background image
9393
\includegraphics{graphics-repo/misc/kryptoparty.jpg}
94+
95+
% TODO(karolin): Copy/paste kerkoffs principle
9496
\end{frame}
9597

9698
\begin{frame}{Open-Source \& Open-Science are mandatory}

2024-09-20-eacn/00300_security_properties.tex

+1-1
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
\begin{column}{.4\linewidth}
66
\small
77

8-
Secure channel protocols like TLS, OpenSSH, or the Noise Protocol Framework \citeNoise are used everywhere on the internet. They are
8+
Secure channel protocols like TLS, OpenSSH, or the Noise Protocol Framework \citeNoise are used everywhere on the internet. They are
99

1010
\begin{itemize}
1111
\item Cheap

0 commit comments

Comments
 (0)