BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:End-to-end encryption: Behind the scenes - D Vasile\,  M Kleppmann
  &amp\; D Thomas  - University of Cambridge Computer Laboratory
DTSTART:20161026T151500Z
DTEND:20161026T161500Z
UID:TALK67806@talks.cam.ac.uk
CONTACT:David Greaves
DESCRIPTION:Everyone is talking about "cloud computing"\, a marketing term
  for "renting time on someone else's computers on the internet". While the
  cloud is great from an efficiency point of view\, it is a potential secur
 ity nightmare: applications have to blindly trust cloud providers that the
 y will preserve the integrity of the data and prevent unauthorised access.
  Data breaches and compromises of cloud providers are a serious risk.\n\nE
 nd-to-end encryption allows us to avoid having to blindly trust the server
 s. An early example is PGP/GnuPG encrypted email\, which never went mainst
 ream\, but more recent secure messaging apps like WhatsApp\, Signal and iM
 essage have shown that it is feasible for millions of people to use end-to
 -end encryption without being security experts.\n\nHow do these protocols 
 actually work? In this talk\, we will give a friendly introduction to secu
 re messaging protocols — to understand the threats against which they de
 fend\, and how cryptographic operations are combined to implement those de
 fences in the protocol. If you have ever wondered what "forward secrecy" m
 eans\, how key exchange works\, or how protocols can ensure you're communi
 cating with the right person (not an impostor like a "man in the middle")\
 , this talk will clear things up.\n\nWe will give a dramatic live performa
 nce of security protocols\, guaranteed to make a dry subject interesting!
LOCATION:Lecture Theatre 1\, Computer Laboratory
END:VEVENT
END:VCALENDAR
