The Multi-User Security of GCM, Revisited - Tight Bounds for Nonce Randomization
Association for Computing Machinery (ACM) via YouTube
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the multi-user security of GCM, the most widely used dedicated AE mode, in this 21-minute conference talk. Delve into new concrete security bounds that improve upon previous work by examining the impact of nonce re-use across users and re-keying. Analyze the refined parameterization of adversarial resources, investigate tight bounds for nonce randomization, and compare the findings with existing research. Gain insights into proving bounds and understand the implications for the security of GCM in multi-user environments.
Syllabus
Introduction
Multiuser Security
Nonce Counters
Tight Bounds
rekeying
proving bounds
comparing bounds
conclusion
Taught by
Association for Computing Machinery (ACM)