Screaming Channels: When TEMPEST Meets Side Channels and Wireless Security

Abstract: TEMPEST attacks are a well-known threat that consists of spying on an electronic device through its unintended physical emissions. Physical emissions are also used by side-channel attacks to break cryptographic implementations. However, while TEMPEST attacks have been demonstrated at large distances (e.g., several meters), side-channel attacks generally work only in the proximity of the target

Participative Security – How to build digital trust

Abstract: The talk will cover: –        What makes customers trust digital services –        How do you engage communities into building strong security –        Are vulnerabilities the end of a company’s reputation Join the Zoom meeting at 12:30 on Thursday, May 27th: https://ethz.zoom.us/j/65841148696

Taming quantum computation with cryptography

Abstract: Quantum computers are expected to provide efficient solutions to problems that are conjectured to be intractable for classical computers (such as the simulation of quantum physical system). This raises the following question: can a classical computer efficiently verify the results of a quantum computation? In 2018, Urmila Mahadev answered this question in the affirmative

Computational records for RSA and finite field Diffie-Hellman

Abstract: This talk reports on the latest computational records in integer factoring and finite field discrete logarithms. These hard computational problems underpin the security of the public-key cryptographic primitives known as RSA and finite field Diffie-Hellman, which are still the most used public-key cryptographic primitives in many contexts. This work required a quite formidable amount of computing power, from various

Probabilistic Data Structures in Adversarial Environments

Abstract: Probabilistic data structures use space-efficient representations of data in order to (approximately) respond to queries about the data. Traditionally, these structures are accompanied by probabilistic bounds on query-response errors. These bounds implicitly assume benign attack models, in which the data and the queries are chosen non-adaptively, and independent of the randomness used to construct

Mondrian: Comprehensive Inter-domain Network Zoning Architecture

Abstract: A central element of designing IT security infrastructures is the logical segmentation of information assets into network zones sharing the same security requirements and policies. As more business ecosystems are migrated to the cloud, additional demands for cybersecurity emerge and make the network-zone operation and management for large corporate networks challenging. In this talk,