{"629977":{"#nid":"629977","#data":{"type":"event","title":"PhD Defense by Shan Chen","body":[{"value":"\u003Cp\u003E\u003Cstrong\u003ETitle: \u003C\/strong\u003ETowards Secure Communication and Authentication: Provable Security Analysis and New Constructions\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EShan Chen\u003C\/p\u003E\r\n\r\n\u003Cp\u003ESchool of\u0026nbsp;Computer\u0026nbsp;Science\u003C\/p\u003E\r\n\r\n\u003Cp\u003ECollege of Computing\u003C\/p\u003E\r\n\r\n\u003Cp\u003EGeorgia Institute of Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EDate:\u003C\/strong\u003E\u0026nbsp; Wednesday, January 8th, 2020\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ETime:\u003C\/strong\u003E\u0026nbsp;12:00 - 2:00 PM (EST)\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ELocation:\u003C\/strong\u003E\u0026nbsp;Coda C1008 Bolton\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ECommittee:\u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Alexandra Boldyreva (Advisor), School of\u0026nbsp;Computer\u0026nbsp;Science, Georgia Institute of Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Mustaque Ahamad, School of\u0026nbsp;Computer\u0026nbsp;Science, Georgia Institute of Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Vladimir Kolesnikov, School of\u0026nbsp;Computer\u0026nbsp;Science, Georgia Institute of Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr.\u0026nbsp;Paul Pearce, School\u0026nbsp;of\u0026nbsp;Computer\u0026nbsp;Science,\u0026nbsp;Georgia Institute of Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr.\u0026nbsp;Gaven Watson, Advanced Cryptography, Visa Research\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EAbstract:\u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E-----------------------\u003C\/p\u003E\r\n\r\n\u003Cp\u003ESecure communication and authentication are some of the most important and practical problems studied in modern cryptography. Plenty of cryptographic protocols have been proposed to accommodate all sorts of requirements in different settings and some of those are widely deployed and utilized in our daily lives. For instance, over half of web traffic is now protected by the Transport Layer Security (TLS) protocol to encrypt the communication between web servers and clients. Not surprisingly, these real-world protocols are hot targets of malicious attacks, which could lead to disastrous confidential information leakage and significant financial loss. It is therefore a crucial goal to provide formal security guarantees of such protocols.\u003Cbr \/\u003E\r\n\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EIn this thesis, we apply the provable security approach, a standard method used in cryptography to formally analyze the security of cryptographic protocols, to three topics related to secure communication and authentication. We first focus on the case where a user and a server share a secret and try to establish a session key for secure communication, for which we construct the first user authentication and key exchange protocols that can tolerate strong corruptions on the client-side. We next consider the setting where a public-key infrastructure (PKI) is available and propose a model to formally compare the security of the most important low-latency secure channel establishment protocols: TLS 1.3 over TCP Fast Open (TFO), QUIC over UDP, and QUIC[TLS] (a new design for QUIC that uses TLS 1.3 key exchange) over UDP. Finally, we perform the first provable security analysis of the new FIDO2 protocols, the promising proposed standard for passwordless user authentication from the Fast IDentity Online (FIDO) Alliance to replace the world\u0026#39;s over-reliance on passwords to authenticate users, and design new constructions to achieve better security.\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Towards Secure Communication and Authentication: Provable Security Analysis and New Constructions"}],"uid":"27707","created_gmt":"2019-12-12 19:21:18","changed_gmt":"2019-12-12 19:21:18","author":"Tatianna Richardson","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2020-01-08T12:00:00-05:00","event_time_end":"2020-01-08T14:00:00-05:00","event_time_end_last":"2020-01-08T14:00:00-05:00","gmt_time_start":"2020-01-08 17:00:00","gmt_time_end":"2020-01-08 19:00:00","gmt_time_end_last":"2020-01-08 19:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"groups":[{"id":"221981","name":"Graduate Studies"}],"categories":[],"keywords":[{"id":"100811","name":"Phd Defense"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1788","name":"Other\/Miscellaneous"}],"invited_audience":[{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}