Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Topics in Cryptography
Search
Mohammad Mahmoody
January 19, 2018
Education
0
120
Topics in Cryptography
Session 01: A bird's view of the journey.
Mohammad Mahmoody
January 19, 2018
Tweet
Share
More Decks by Mohammad Mahmoody
See All by Mohammad Mahmoody
Class 26
mahmoody
0
23k
Class 25
mahmoody
0
24k
Class 21
mahmoody
0
7.9k
class 20
mahmoody
0
9.3k
Class 19
mahmoody
0
8.5k
Class 17
mahmoody
0
8.9k
Class 16
mahmoody
0
7.9k
Class 14
mahmoody
0
8.4k
Class 12
mahmoody
0
9.5k
Other Decks in Education
See All in Education
AIC 103 - Applications of Property Valuation: Essential Slides
rmccaic
0
200
2025年度春学期 統計学 第10回 分布の推測とは ー 標本調査,度数分布と確率分布 (2025. 6. 12)
akiraasano
PRO
0
130
技術勉強会 〜 OAuth & OIDC 入門編 / 20250528 OAuth and OIDC
oidfj
5
1.2k
America and the World
oripsolob
0
510
Tangible, Embedded and Embodied Interaction - Lecture 7 - Next Generation User Interfaces (4018166FNR)
signer
PRO
0
1.7k
SkimaTalk Teacher Guidelines
skimatalk
0
790k
View Manipulation and Reduction - Lecture 9 - Information Visualisation (4019538FNR)
signer
PRO
1
2k
生成AIとの上手な付き合い方【公開版】/ How to Get Along Well with Generative AI (Public Version)
handlename
0
470
人になにかを教えるときに考えていること(2025-05版 / VRC-LT #18)
sksat
4
1k
マネジメント「される側」 こそ覚悟を決めろ
nao_randd
10
5.3k
OpenRobomaster 中国のロボットコンテスト 日本連携の可能性
takasumasakazu
0
450
演習問題
takenawa
0
4.8k
Featured
See All Featured
Facilitating Awesome Meetings
lara
54
6.4k
Learning to Love Humans: Emotional Interface Design
aarron
273
40k
Practical Tips for Bootstrapping Information Extraction Pipelines
honnibal
PRO
20
1.3k
Bootstrapping a Software Product
garrettdimon
PRO
307
110k
GitHub's CSS Performance
jonrohan
1031
460k
Connecting the Dots Between Site Speed, User Experience & Your Business [WebExpo 2025]
tammyeverts
5
210
Save Time (by Creating Custom Rails Generators)
garrettdimon
PRO
31
1.2k
Rebuilding a faster, lazier Slack
samanthasiow
81
9.1k
"I'm Feeling Lucky" - Building Great Search Experiences for Today's Users (#IAC19)
danielanewman
228
22k
ReactJS: Keep Simple. Everything can be a component!
pedronauck
667
120k
10 Git Anti Patterns You Should be Aware of
lemiorhan
PRO
657
60k
The Psychology of Web Performance [Beyond Tellerrand 2023]
tammyeverts
48
2.8k
Transcript
Special Topics in Cryptography Mohammad Mahmoody
Cryptography’s main goals
Secure communication
Historic Ciphers
Privacy / confidentiality
Integrity / Authentication
Integrity / Authentication
Not loosing in chess to the grand master
Tool: Pseudorandom (number) generators
Public Key Encryption Revolution (70’s)
Four main problems in cryptographic
Main tool for public-key cryptography: Number theory and structured mathematics
Beyond Encryption and Authentication
Multi-party Computation
Yao’s Billionaires Problem
Poker over the phone
Generalization: multi-party computation
Multiparty consensus mechanisms (and block-chain protocols …)
Weird useful tool: Zero Knowledge Proofs
More powerful forms of Encryption
Homomorphic Encryption
Searchable Encryption
And many more…
None
Encryption : Perfect secrecy and its limitations
None
Chapters 1-2 of Katz-Lindell book • Steganography and why it
is not a good idea • Defining Perfect Secrecy • Problems with perfect secrecy
Setting for private-key encryption schemes • Alice and Bob share
some “secret information” in advance • They want to communicate a new message secretly. • The communication happens in public.
Steganography • Art of concealing the message in “innocent-looking” messages.
Steganography • Even the algorithm used by Alice and Bob
is hidden… • When is it useful? • What is wrong with it?
Kerckhoffs's principle
Caesar cipher (weak variant) • the th letter is substituted
with ( + ) th letter. • Is it secure?
Caesar Cipher (strong variant) • Secret key: a random permutation
over all letters. • Key size: log 26! > 88 bits • Is it now secure?