{"604395":{"#nid":"604395","#data":{"type":"event","title":"Cybersecurity Lecture Series with Shan Chen","body":[{"value":"\u003Cp\u003EThe \u003Ca href=\u0022https:\/\/iisp.gatech.edu\/cyber-lecture\u0022\u003ECybersecurity Lecture Series at Georgia Tech\u003C\/a\u003E is a free, one-hour lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups and incubators, as well as Georgia Tech faculty and students presenting their research. Lectures are open to all -- students, faculty, industry, government, or simply the curious.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/attend.com\/Chen\u0022\u003ERSVP\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003E\u0026quot;Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC\u0026quot;\u003C\/em\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003EAs the most popular protocol to establish a secure communication channel over the Internet, the current standard TLS 1.2 over TCP requires 3-round-trip-time (3-RTT) initial and 2-RTT resumption handshakes before sending any encrypted application data. To reduce such latency without sacrificing security, two protocols stand out: TLS 1.3 as a new version of TLS and QUIC as a low-latency transport protocol. In particular, TLS 1.3 over TCP Fast Open (TFO), a TCP optimization, achieves 0-RTT resumptions, and so does QUIC over UDP. There have been a lot of formal security analyses for TLS 1.3 and QUIC, but their security, when layered with their underlying transport protocols, cannot be easily compared due to the lack of a universal model.\u0026nbsp;We propose a model and employs it to compare the security of TFO+TLS 1.3 and UDP+QUIC.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022https:\/\/www.linkedin.com\/in\/shan-chen-488557a2\/\u0022\u003EShan Chen\u0026nbsp;\u003C\/a\u003Eis a Ph.D. student advised by Alexandra Boldyreva in the School of Computer Science at Georgia Tech. His research focuses on applied cryptography and in particular secure channel establishment protocols.\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EOn Friday, April 6 guest speaker Shan Chen, Ph.D. Student at the Georgia Tech College of Computing will present his lecture titled, \u003Cem\u003E\u0026quot;\u003C\/em\u003E\u003Cem\u003ESecure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC\u0026quot;.\u003C\/em\u003E\u003C\/p\u003E\r\n\r\n\u003Cdiv\u003E\u0026nbsp;\u003C\/div\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Free, open-to-the public discussion about cybersecurity risks, trends, and techniques."}],"uid":"34659","created_gmt":"2018-03-28 19:55:36","changed_gmt":"2018-03-28 19:55:36","author":"lpanetta3","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2018-04-06T13:00:00-04:00","event_time_end":"2018-04-06T14:00:00-04:00","event_time_end_last":"2018-04-06T14:00:00-04:00","gmt_time_start":"2018-04-06 17:00:00","gmt_time_end":"2018-04-06 18:00:00","gmt_time_end_last":"2018-04-06 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"604392":{"id":"604392","type":"image","title":"Shan Chen","body":null,"created":"1522266219","gmt_created":"2018-03-28 19:43:39","changed":"1522266219","gmt_changed":"2018-03-28 19:43:39","alt":"","file":{"fid":"230385","name":"FullSizeRender.jpg","image_path":"\/sites\/default\/files\/images\/FullSizeRender_4.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/FullSizeRender_4.jpg","mime":"image\/jpeg","size":537386,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/FullSizeRender_4.jpg?itok=96Mm9pNp"}},"593723":{"id":"593723","type":"image","title":"Cybersecurity Lecture Series by IISP","body":null,"created":"1500996186","gmt_created":"2017-07-25 15:23:06","changed":"1500996186","gmt_changed":"2017-07-25 15:23:06","alt":"","file":{"fid":"226333","name":"CLS_logo_FY18 w tag.jpg","image_path":"\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","mime":"image\/jpeg","size":580256,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/CLS_logo_FY18%20w%20tag.jpg?itok=S8GXpa-Z"}}},"media_ids":["604392","593723"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"3748","name":"communication"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"10377","name":"Career\/Professional development"},{"id":"1789","name":"Conference\/Symposium"},{"id":"1788","name":"Other\/Miscellaneous"},{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:lindsey.panetta@gtri.gatech.edu\u0022\u003Elindsey.panetta@gtri.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}