kennyog Profile Banner
kennyog Profile
kennyog

@kennyog

Followers
8K
Following
12K
Media
252
Statuses
6K

Professor of Computer Science at ETH Zurich. Views my own. Apparently in a semi-religious crypto/privacy cult. Join us! He/him.

Zurich, Switzerland
Joined May 2008
Don't wanna be here? Send us removal request.
@kennyog
kennyog
6 months
Looking forward to co-organising this event with @jurajsomorovsky - send us your great talk proposals and papers before March 23rd (AoE).
@jurajsomorovsky
juraj somorovsky
6 months
Come join us at the SPIQE workshop in Munich in June! - we are now open for paper submissions and talk proposals on all aspects of secure protocol implementation for the post-quantum era.
0
0
4
@kennyog
kennyog
6 months
RT @jurajsomorovsky: Come join us at the SPIQE workshop in Munich in June! - we are now open for paper submissions….
0
2
0
@kennyog
kennyog
11 months
Brilliant and scary new paper from @kientuong114 and @jonas__hofmann to appear at ACM CCS 2024 - they analysed multiple "zero knowledge" E2EE cloud storage vendors' products and found major holes in their crypto architectures. "A broken ecosystem" indeed.
@kientuong114
Kien Tuong Truong
11 months
📄 End-to-end Encrypted Cloud Storage in the Wild: A Broken Ecosystem (To appear at ACM CCS 2024). Joint work with @jonas__hofmann. We analyzed five end-to-end encrypted cloud storage services and found severe vulnerabilities in four of them. 🌐:
1
22
58
@kennyog
kennyog
1 year
14/14.You can find other interesting open problems, our provably secure E2EE cloud storage construction, game-based security notions that are surprisingly compact, and pages of beautiful proofs , all in our full paper:
Tweet card summary image
eprint.iacr.org
Users increasingly store their data in the cloud, thereby benefiting from easy access, sharing, and redundancy. To additionally guarantee security of the outsourced data even against a server...
2
1
10
@kennyog
kennyog
1 year
13/14.Another is to achieve advanced security properties that other E2EE primitives offer, such as FS and PCS, in the cloud storage setting.
1
1
5
@kennyog
kennyog
1 year
12/14.To only mention a few: one is analysing whether our protocol achieves adaptive security, or if this can be achieved efficiently by another protocol based on standard cryptographic assumptions.
1
1
4
@kennyog
kennyog
1 year
11/14.We discuss many challenges on the path towards bringing the security of cloud storage up to par with other end-to-end primitives, which should be interesting for future research.
1
1
4
@kennyog
kennyog
1 year
10/14.Contribution 4: We present a design for an E2EE cloud storage system that supports all core functionality, is efficient and is provably secure with respect to our selective security notions.
1
1
5
@kennyog
kennyog
1 year
9/14.Contribution 3: We put our models to the test and use them to formally capture some of the recent attacks on MEGA, showing our framework is rich enough to model deployed systems and capture practical attacks.
1
1
4
@kennyog
kennyog
1 year
8/14.Contribution 2: We define game-based security notions for confidentiality and integrity of E2EE cloud storage against a fully malicious server, treating both selective and fully adaptive client compromises.
1
1
5
@kennyog
kennyog
1 year
7/14.Contribution 1: We give a formal syntax capturing the core functionality of E2EE cloud storage while honouring the real-world complexity of such systems and supporting interactive protocols and out-of-band channels.
1
1
5
@kennyog
kennyog
1 year
6/14.In this paper, we initiate the formal study of E2EE cloud storage and make four main contributions towards understanding the security of E2EE cloud storage and bringing it up to par with other E2EE applications.
1
1
4
@kennyog
kennyog
1 year
5/14.Instead, deployed E2EE cloud storage protocols involve custom designs attempting to solve many complex cryptographic challenges, including password-based key management and file sharing, Despite this complexity, there's no formal guarantees to back up their security claims.
1
1
4
@kennyog
kennyog
1 year
4/14.It turns out the security of E2EE cloud storage lags behind that of other E2EE applications like secure messaging. There is no rigorous foundation, no security notions, and no provably secure protocols.
1
1
5
@kennyog
kennyog
1 year
3/14.Users increasingly store their data in the cloud for easy access, sharing, and redundancy. E2EE should protect the data even against server compromise. However, recent research from my group has discovered attacks against widely deployed systems including MEGA and Nextcloud.
1
1
5
@kennyog
kennyog
1 year
1/14.A Formal Treatment of End-to-End Encrypted Cloud Storage (Crypto'24): in this new paper we designed an E2EE cloud storage protocol and prove it secure in novel game-based confidentiality and integrity notions that capture real-world complexities and malicious servers.
1
26
80
@kennyog
kennyog
1 year
RT @PresidentIRL: Best wishes to all who are participating in Take Your Dog to Work Day today
Tweet media one
0
6K
0
@kennyog
kennyog
1 year
RT @mitrokat: Swiss Crypto Day 2024 is taking place @HSGStGallen on the 2nd of Sept! 📢 Register now✍️and nominate talks 🎙️ Spread the word….
swisscryptoday.github.io
Swiss Crypto Day A full day of cryptography talks in Switzerland
0
5
0
@kennyog
kennyog
1 year
RT @DollyBenga: Only the second biggest lie emblazoned on a bus x
Tweet media one
0
96
0