Lecture preparation

Before lecture, read the paper assigned below, and submit two items to the submission website:

Also keep in mind that you will need to write a paper summary for your choice of papers throughout the semester.


Read the paper Everest: Towards a Verified, Drop-in Replacement of HTTPS by a large team mostly associated with Microsoft Research.

Why are we reading this paper?

What to learn from this paper?

Answer this question

The paper talks about game-based cryptographic proofs, which show that the Everest TLS implementation implements an idealized secure channel, assuming the underlying cryptography is correct. What cryptographic primitives do the authors assume correct? How do they encode the assumption that these primitives are correct?