Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Topics in Cryptography
Search
Sponsored
·
Your Podcast. Everywhere. Effortlessly.
Share. Educate. Inspire. Entertain. You do you. We'll handle the rest.
→
Mohammad Mahmoody
January 19, 2018
Education
0
130
Topics in Cryptography
Session 01: A bird's view of the journey.
Mohammad Mahmoody
January 19, 2018
Tweet
Share
More Decks by Mohammad Mahmoody
See All by Mohammad Mahmoody
Class 26
mahmoody
0
25k
Class 25
mahmoody
0
25k
Class 21
mahmoody
0
7.9k
class 20
mahmoody
0
9.3k
Class 19
mahmoody
0
8.6k
Class 17
mahmoody
0
8.9k
Class 16
mahmoody
0
7.9k
Class 14
mahmoody
0
8.5k
Class 12
mahmoody
0
9.5k
Other Decks in Education
See All in Education
Use Cases and Course Review - Lecture 8 - Human-Computer Interaction (1023841ANR)
signer
PRO
0
1.4k
HyRead2526
cbtlibrary
0
200
Future Trends and Review - Lecture 12 - Web Technologies (1019888BNR)
signer
PRO
0
3.2k
1014
cbtlibrary
0
530
JAPAN AI CUP Prediction Tutorial
upura
2
680
JavaScript - Lecture 6 - Web Technologies (1019888BNR)
signer
PRO
0
3.1k
Cifrado asimétrico
irocho
0
380
子どもが自立した学習者となるデジタルの活用について
naokikato
PRO
0
180
【ベテランCTOからのメッセージ】AIとか組織とかキャリアとか気になることはあるけどさ、個人の技術力から目を背けないでやっていきましょうよ
netmarkjp
2
2.7k
Activité_5_-_Les_indicateurs_du_climat_global.pdf
bernhardsvt
0
140
焦りと不安を、技術力に変える方法 - 新卒iOSエンジニアの失敗談と成長のフレームワーク
hypebeans
1
650
栃木にいても「だいじ」だっぺ〜! 栃木&全国アジャイルコミュニティへの参加・運営の魅力
sasakendayo
1
140
Featured
See All Featured
GitHub's CSS Performance
jonrohan
1032
470k
The Anti-SEO Checklist Checklist. Pubcon Cyber Week
ryanjones
0
67
How to Create Impact in a Changing Tech Landscape [PerfNow 2023]
tammyeverts
55
3.2k
Design of three-dimensional binary manipulators for pick-and-place task avoiding obstacles (IECON2024)
konakalab
0
350
How to audit for AI Accessibility on your Front & Back End
davetheseo
0
180
Understanding Cognitive Biases in Performance Measurement
bluesmoon
32
2.8k
A brief & incomplete history of UX Design for the World Wide Web: 1989–2019
jct
1
300
The untapped power of vector embeddings
frankvandijk
1
1.6k
4 Signs Your Business is Dying
shpigford
187
22k
Breaking role norms: Why Content Design is so much more than writing copy - Taylor Woolridge
uxyall
0
170
AI: The stuff that nobody shows you
jnunemaker
PRO
2
260
Stop Working from a Prison Cell
hatefulcrawdad
273
21k
Transcript
Special Topics in Cryptography Mohammad Mahmoody
Cryptography’s main goals
Secure communication
Historic Ciphers
Privacy / confidentiality
Integrity / Authentication
Integrity / Authentication
Not loosing in chess to the grand master
Tool: Pseudorandom (number) generators
Public Key Encryption Revolution (70’s)
Four main problems in cryptographic
Main tool for public-key cryptography: Number theory and structured mathematics
Beyond Encryption and Authentication
Multi-party Computation
Yao’s Billionaires Problem
Poker over the phone
Generalization: multi-party computation
Multiparty consensus mechanisms (and block-chain protocols …)
Weird useful tool: Zero Knowledge Proofs
More powerful forms of Encryption
Homomorphic Encryption
Searchable Encryption
And many more…
None
Encryption : Perfect secrecy and its limitations
None
Chapters 1-2 of Katz-Lindell book • Steganography and why it
is not a good idea • Defining Perfect Secrecy • Problems with perfect secrecy
Setting for private-key encryption schemes • Alice and Bob share
some “secret information” in advance • They want to communicate a new message secretly. • The communication happens in public.
Steganography • Art of concealing the message in “innocent-looking” messages.
Steganography • Even the algorithm used by Alice and Bob
is hidden… • When is it useful? • What is wrong with it?
Kerckhoffs's principle
Caesar cipher (weak variant) • the th letter is substituted
with ( + ) th letter. • Is it secure?
Caesar Cipher (strong variant) • Secret key: a random permutation
over all letters. • Key size: log 26! > 88 bits • Is it now secure?