E N D
1. Provable Security: Some Caveats
2. What is provable security?
3. Is this provable security?
4. Or this follow-on?
5. Is this provable security?
6. A follow-on
7. Problems with provable security Who shall guard the guardians? Who’s to say that a proof is correct?
Worst case security ? Average case security
Asymptotic security ? Real world security
8. But even with a more precise notion of ‘‘provable security’’...
9. Amdahl’s Law
10. Amdahl’s Law
11. “Amdahl’s Law of Security”
12. “Amdahl’s Law of Security”
13. Provable Security Strengthens Most Secure Part As far as we know, cryptography is rarely weakest point in system. Instead, it’s:
Bad password selection
Social engineering
Bad software implementation
15. Provable security May distract from more critical vulnerabilities
Hackers just go around the crypto
May yield more complex algorithms, and therefore make correct implementation less likely
Slow down implementations and encourage avoidance of crypto
16. What lessons to be learned? Emphasis on extensive expert and empirical testing as a basis for security as with, e.g., RSA
Can be in addition to proofs
Emphasis on simple proofs and algorithms and on ‘exact security’