SFB CROSSING - Our research on Strongly Secure Connection Establisment
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 14 | |
Author | ||
License | CC Attribution 3.0 Germany: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/48687 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
QuantumAreaSoftwareInformation securityPhysical system
00:11
Projective planeAreaConnected spaceInformation securityInternetworkingTelecommunicationComputer animation
00:25
Connected spaceData storage devicePoint cloudData exchangeSensitivity analysisCryptography
00:41
SchlüsselverteilungToken ringMathematical modelComputer hardwareKey (cryptography)BuildingArithmetic meanInformation securityCommunications protocolQuantumInternetworkingImplementationSoftware developerDifferent (Kate Ryan album)Complex (psychology)Level (video gaming)Multiplication signProjective planeCollaborationismCryptographyConnectivity (graph theory)Condition numberConnected spaceField (computer science)Program flowchart
01:56
Power (physics)Connected spaceInformation securityQuantum computer
02:06
Token ringInformation securityMultiplication signMoore's lawScalabilityQuantum computerList of unsolved problems in mathematicsConnected spaceNeuroinformatikType theory
02:36
Computer hardwareCommunications protocolConstructor (object-oriented programming)Projective planeConnected spaceInformation securityInternetworkingKey (cryptography)Schlüsselverteilung
03:00
Connected spaceInformation securityWebsiteXML
Transcript: English(auto-generated)
00:03
CROSSING is a joint effort of scientists from quantum physics, cryptography, system security and software engineering, who collaborate in three interconnected project areas. In Project S4, CROSSING is doing research on strongly secure connection establishment.
00:22
Today's communication relies on the internet. Global connections transport sensitive data between private users, businesses and cloud storage. It is essential that connections are secure and provide confidentiality for the data exchanged. Therefore, cryptographic procedures, called protocols, are run to establish a shared secret
00:45
key which is then used to protect the exchanged data. Common cryptographic channel protocols, like TLS, are used billions of times every day. Our aim is to advance the field of secure connections by investigating the security of
01:02
channel protocols and by looking at new means to build long-term secure solutions via hardware tokens and quantum technology. To capture the security of deployed channel protocols as precisely as possible, we develop mathematical models. Our goal is to evaluate the security of today's internet connections and to establish
01:24
mathematical guarantees for the provided security level. Another research topic is the complex interplay of different protocols, particularly between key exchange and data transport. We study intersections between different sub-protocols to establish conditions which allow us to
01:44
compose secure components. In collaboration with Project E1, we assist developers in choosing the protocols to combine in their implementations. Beyond classical attacks, we predict that the security of connections will soon be
02:02
threatened by rapidly evolving quantum computing power. While a scalable quantum computer hasn't been built yet, we can predict that this type of computer would be able to solve several hard mathematical problems that are the foundation of most secure channels in use today.
02:20
A promising defense against quantum computers is to build connections whose security relies on information-theoretic assumptions, which are unbreakable no matter how much time and computation power are applied. One way to achieve information-theoretic security is to employ hardware tokens.
02:41
A key piece of our project is to construct key exchange protocols based on these hardware tokens, which allow shared secret keys to be created in a quantum-secure way. Our research enables strongly secure connection establishment for the next-generation Internet.
03:01
To learn more about strongly secure connection establishment, please visit our website.