Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Topics in Cryptography
Search
Mohammad Mahmoody
January 19, 2018
Education
0
130
Topics in Cryptography
Session 01: A bird's view of the journey.
Mohammad Mahmoody
January 19, 2018
Tweet
Share
More Decks by Mohammad Mahmoody
See All by Mohammad Mahmoody
Class 26
mahmoody
0
25k
Class 25
mahmoody
0
25k
Class 21
mahmoody
0
7.9k
class 20
mahmoody
0
9.3k
Class 19
mahmoody
0
8.6k
Class 17
mahmoody
0
8.9k
Class 16
mahmoody
0
7.9k
Class 14
mahmoody
0
8.5k
Class 12
mahmoody
0
9.5k
Other Decks in Education
See All in Education
Chapitre_2_-_Partie_2.pdf
bernhardsvt
2
230
演習:Gitの基本操作 / 04-git-basic
kaityo256
PRO
0
350
Activité_5_-_Les_indicateurs_du_climat_global.pdf
bernhardsvt
0
210
P3NFEST 2026 Spring ハンズオン「ハッキング・ラブ!はじめてのハッキングをやってみよう」資料
nomizone
0
340
AIでキミの未来はどう変わる?
behomazn
0
120
HyRead2526
cbtlibrary
1
230
GOBUSATA紹介
chankawa919
0
130
The World That Saved Me: A Story of Community and Gratitude
_hashimo2
4
540
栃木にいても「だいじ」だっぺ〜! 栃木&全国アジャイルコミュニティへの参加・運営の魅力
sasakendayo
1
180
Modelamiento Matematico (Ingresantes UNI 2026)
robintux
0
260
この講義について / 00-setup
kaityo256
PRO
0
240
リモートリポジトリの操作 / 02-c-remote
kaityo256
PRO
0
120
Featured
See All Featured
The Limits of Empathy - UXLibs8
cassininazir
1
270
Agile Actions for Facilitating Distributed Teams - ADO2019
mkilby
0
150
WENDY [Excerpt]
tessaabrams
9
37k
Java REST API Framework Comparison - PWX 2021
mraible
34
9.2k
Jamie Indigo - Trashchat’s Guide to Black Boxes: Technical SEO Tactics for LLMs
techseoconnect
PRO
0
87
実際に使うSQLの書き方 徹底解説 / pgcon21j-tutorial
soudai
PRO
199
73k
I Don’t Have Time: Getting Over the Fear to Launch Your Podcast
jcasabona
34
2.7k
A Guide to Academic Writing Using Generative AI - A Workshop
ks91
PRO
0
240
The Cost Of JavaScript in 2023
addyosmani
55
9.8k
Unlocking the hidden potential of vector embeddings in international SEO
frankvandijk
0
210
GraphQLとの向き合い方2022年版
quramy
50
14k
The Curious Case for Waylosing
cassininazir
0
270
Transcript
Special Topics in Cryptography Mohammad Mahmoody
Cryptography’s main goals
Secure communication
Historic Ciphers
Privacy / confidentiality
Integrity / Authentication
Integrity / Authentication
Not loosing in chess to the grand master
Tool: Pseudorandom (number) generators
Public Key Encryption Revolution (70’s)
Four main problems in cryptographic
Main tool for public-key cryptography: Number theory and structured mathematics
Beyond Encryption and Authentication
Multi-party Computation
Yao’s Billionaires Problem
Poker over the phone
Generalization: multi-party computation
Multiparty consensus mechanisms (and block-chain protocols …)
Weird useful tool: Zero Knowledge Proofs
More powerful forms of Encryption
Homomorphic Encryption
Searchable Encryption
And many more…
None
Encryption : Perfect secrecy and its limitations
None
Chapters 1-2 of Katz-Lindell book • Steganography and why it
is not a good idea • Defining Perfect Secrecy • Problems with perfect secrecy
Setting for private-key encryption schemes • Alice and Bob share
some “secret information” in advance • They want to communicate a new message secretly. • The communication happens in public.
Steganography • Art of concealing the message in “innocent-looking” messages.
Steganography • Even the algorithm used by Alice and Bob
is hidden… • When is it useful? • What is wrong with it?
Kerckhoffs's principle
Caesar cipher (weak variant) • the th letter is substituted
with ( + ) th letter. • Is it secure?
Caesar Cipher (strong variant) • Secret key: a random permutation
over all letters. • Key size: log 26! > 88 bits • Is it now secure?