Decluttering my mind into the web ...
Contents:
Section 1: Cut and Choose ---- Video 01: Blind Signatures ---- Video 02: Anonymous Money Orders ---- Video 03: Graph Isomorphism and Zero Knowledge Proofs ---- Video 04: FFS Proof of Identity ---- Video 05: Oblivious Transfer Section 2: Cryptographic Techniques ---- Video 06: Secret Splitting and Secret Sharing ---- Video 07: Bit Commitment ---- Video 08: Timestamping ---- Video 09: Dining Cryptographers ---- Video 10: Commutative Encryption and Mental Poker
Besides its potential to aid in spying, cryptography can also be coerced to have “backdoors.” In this section, we discuss privacy issues in the current political climate.
Lecture Video Guide
Encryption with Backdoors: Many law enforcement agencies and governments have incentive to spy on users of encrypted communications (all of us), hence the need for encryption with backdoors only accessible by government. Is this possible, or advisable?
Plausible Deniability and Perfect Forward Security: Saying “I did not do it” is a denial. A stronger response is, “Can you prove that I did it, in spite of finding all keys?” If the answer is “no,” I have plausible deniability. That is to say, no traces are found. This entangles with the idea of perfect forward security. This lecture discusses these two important concepts in communications.
MITM attacks and Diffie Hellman: This lecture revisits Diffie Helman and MITM attacks because Diffie Helman has properties that allow for both perfect forward security and plausible deniability. However, MITM is impossible to solve. This lecture shows why, and how can we find solutions to the problem.
The “Off the Record” Protocol: Off the Record (OTR) is an instant messaging protocol that is built into several off-the-shelf messengers, notably signal and pidgin. This lecture presents an overview of the complex inner workings of this protocol.
Secure Elections - Part 1 & 2:
Electronic and digital voting methods are common in elections, though seriously insecure. It is nearly impossible to ensure secure voting protocols. The protocol is covered in this two-part lecture.
Money is often considered a universal language–something that everyone can understand–and is commonplace. People interact with money on a daily basis through trusted banks, and now, with electronic transactions, digital money (currencies), and digital cash (cash-like anonymity). In this section of the course, we discuss how cryptography makes all of this possible.
Lecture Video Guide
Digital Currency: What is currency? This lecture takes a brief detour from cryptography to lay the foundations for understanding digital currency and how it works.
Bitcoin and Blockchain: Bitcoin is one of many digital currencies. Though simple, it requires a blockchain to ensure users are honest. This lecture provides an overview of how this system works.
Simultaneous Contract Signing: Suppose Alice and Bob both need to sign a contract. Alice does not want to sign first, because then Bob could run away, leaving the contract unsigned. Using cryptography, they can sign simultaneously. This difficult protocol is necessary for building a digital cash protocol.
Digital Cash Protocols - Part 1 & 2:
Digital cash, like paper money, is anonymous and can be used to transfer money between Alice and Bob without an internet connection. This intricate protocol is addressed in a two-part lecture.