Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Topics in Cryptography
Search
Mohammad Mahmoody
January 19, 2018
Education
0
130
Topics in Cryptography
Session 01: A bird's view of the journey.
Mohammad Mahmoody
January 19, 2018
Tweet
Share
More Decks by Mohammad Mahmoody
See All by Mohammad Mahmoody
Class 26
mahmoody
0
24k
Class 25
mahmoody
0
25k
Class 21
mahmoody
0
7.9k
class 20
mahmoody
0
9.3k
Class 19
mahmoody
0
8.6k
Class 17
mahmoody
0
8.9k
Class 16
mahmoody
0
7.9k
Class 14
mahmoody
0
8.4k
Class 12
mahmoody
0
9.5k
Other Decks in Education
See All in Education
【旧:ZEPメタバース校舎操作ガイド】
ainischool
0
770
学習指導要領と解説に基づく学習内容の構造化の試み / Course of study Commentary LOD JAET 2025
masao
0
110
20251023@天童市いこう会
koshiba_noriaki
0
120
HTML5 and the Open Web Platform - Lecture 3 - Web Technologies (1019888BNR)
signer
PRO
2
3.2k
中央教育審議会 教育課程企画特別部会 情報・技術ワーキンググループに向けた提言 ー次期学習指導要領での情報活用能力の抜本的向上に向けてー
codeforeveryone
0
490
XML and Related Technologies - Lecture 7 - Web Technologies (1019888BNR)
signer
PRO
0
3.2k
Linguaxes de programación
irocho
0
510
東大1年生にJulia教えてみた
matsui_528
7
11k
多様なメンター、多様な基準
yasulab
5
19k
自己紹介 / who-am-i
yasulab
4
6.2k
IKIGAI World Fes:program
tsutsumi
1
2.6k
令和エンジニアの学習法 〜 生成AIを使って挫折を回避する 〜
moriga_yuduru
0
220
Featured
See All Featured
Impact Scores and Hybrid Strategies: The future of link building
tamaranovitovic
0
190
Organizational Design Perspectives: An Ontology of Organizational Design Elements
kimpetersen
PRO
1
67
Gemini Prompt Engineering: Practical Techniques for Tangible AI Outcomes
mfonobong
2
260
SERP Conf. Vienna - Web Accessibility: Optimizing for Inclusivity and SEO
sarafernandez
1
1.3k
How to optimise 3,500 product descriptions for ecommerce in one day using ChatGPT
katarinadahlin
PRO
0
3.4k
How to Get Subject Matter Experts Bought In and Actively Contributing to SEO & PR Initiatives.
livdayseo
0
49
Why Mistakes Are the Best Teachers: Turning Failure into a Pathway for Growth
auna
0
43
SEOcharity - Dark patterns in SEO and UX: How to avoid them and build a more ethical web
sarafernandez
0
110
Visualization
eitanlees
150
16k
エンジニアに許された特別な時間の終わり
watany
106
230k
AI Search: Where Are We & What Can We Do About It?
aleyda
0
6.8k
Efficient Content Optimization with Google Search Console & Apps Script
katarinadahlin
PRO
0
290
Transcript
Special Topics in Cryptography Mohammad Mahmoody
Cryptography’s main goals
Secure communication
Historic Ciphers
Privacy / confidentiality
Integrity / Authentication
Integrity / Authentication
Not loosing in chess to the grand master
Tool: Pseudorandom (number) generators
Public Key Encryption Revolution (70’s)
Four main problems in cryptographic
Main tool for public-key cryptography: Number theory and structured mathematics
Beyond Encryption and Authentication
Multi-party Computation
Yao’s Billionaires Problem
Poker over the phone
Generalization: multi-party computation
Multiparty consensus mechanisms (and block-chain protocols …)
Weird useful tool: Zero Knowledge Proofs
More powerful forms of Encryption
Homomorphic Encryption
Searchable Encryption
And many more…
None
Encryption : Perfect secrecy and its limitations
None
Chapters 1-2 of Katz-Lindell book • Steganography and why it
is not a good idea • Defining Perfect Secrecy • Problems with perfect secrecy
Setting for private-key encryption schemes • Alice and Bob share
some “secret information” in advance • They want to communicate a new message secretly. • The communication happens in public.
Steganography • Art of concealing the message in “innocent-looking” messages.
Steganography • Even the algorithm used by Alice and Bob
is hidden… • When is it useful? • What is wrong with it?
Kerckhoffs's principle
Caesar cipher (weak variant) • the th letter is substituted
with ( + ) th letter. • Is it secure?
Caesar Cipher (strong variant) • Secret key: a random permutation
over all letters. • Key size: log 26! > 88 bits • Is it now secure?