Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Topics in Cryptography
Search
Mohammad Mahmoody
January 19, 2018
Education
0
120
Topics in Cryptography
Session 01: A bird's view of the journey.
Mohammad Mahmoody
January 19, 2018
Tweet
Share
More Decks by Mohammad Mahmoody
See All by Mohammad Mahmoody
Class 26
mahmoody
0
23k
Class 25
mahmoody
0
24k
Class 21
mahmoody
0
7.9k
class 20
mahmoody
0
9.3k
Class 19
mahmoody
0
8.5k
Class 17
mahmoody
0
8.9k
Class 16
mahmoody
0
7.9k
Class 14
mahmoody
0
8.4k
Class 12
mahmoody
0
9.5k
Other Decks in Education
See All in Education
AWSと共に英語を学ぼう
amarelo_n24
0
150
生態系ウォーズ - ルールブック
yui_itoshima
1
250
【Discordアカウント作成ガイド】
ainischool
0
120
理想の英語力に一直線!最高効率な英語学習のすゝめ
logica0419
6
390
シリコンバレーでスタートアップを共同創業したファウンディングエンジニアとしての学び
tomoima525
1
1.2k
社外コミュニティの歩き方
masakiokuda
2
190
RSJ2025 ランチョンセミナー 一歩ずつ世界へ:学生・若手研究者のための等身大の国際化の始め方
t_inamura
0
280
~キャラ付け考えていますか?~ AI時代だからこそ技術者に求められるセルフブランディングのすゝめ
masakiokuda
7
470
登壇未経験者のための登壇戦略~LTは設計が9割!!!~
masakiokuda
3
670
Padlet opetuksessa
matleenalaakso
4
14k
Avoin jakaminen ja Creative Commons -lisenssit
matleenalaakso
0
2k
20250611_なんでもCopilot1年続いたぞ~
ponponmikankan
0
170
Featured
See All Featured
Designing Dashboards & Data Visualisations in Web Apps
destraynor
231
53k
Making Projects Easy
brettharned
117
6.4k
The MySQL Ecosystem @ GitHub 2015
samlambert
251
13k
We Have a Design System, Now What?
morganepeng
53
7.8k
How to Ace a Technical Interview
jacobian
279
23k
Helping Users Find Their Own Way: Creating Modern Search Experiences
danielanewman
29
2.9k
Dealing with People You Can't Stand - Big Design 2015
cassininazir
367
27k
Learning to Love Humans: Emotional Interface Design
aarron
273
40k
Optimizing for Happiness
mojombo
379
70k
The Art of Delivering Value - GDevCon NA Keynote
reverentgeek
15
1.7k
The Pragmatic Product Professional
lauravandoore
36
6.9k
YesSQL, Process and Tooling at Scale
rocio
173
14k
Transcript
Special Topics in Cryptography Mohammad Mahmoody
Cryptography’s main goals
Secure communication
Historic Ciphers
Privacy / confidentiality
Integrity / Authentication
Integrity / Authentication
Not loosing in chess to the grand master
Tool: Pseudorandom (number) generators
Public Key Encryption Revolution (70’s)
Four main problems in cryptographic
Main tool for public-key cryptography: Number theory and structured mathematics
Beyond Encryption and Authentication
Multi-party Computation
Yao’s Billionaires Problem
Poker over the phone
Generalization: multi-party computation
Multiparty consensus mechanisms (and block-chain protocols …)
Weird useful tool: Zero Knowledge Proofs
More powerful forms of Encryption
Homomorphic Encryption
Searchable Encryption
And many more…
None
Encryption : Perfect secrecy and its limitations
None
Chapters 1-2 of Katz-Lindell book • Steganography and why it
is not a good idea • Defining Perfect Secrecy • Problems with perfect secrecy
Setting for private-key encryption schemes • Alice and Bob share
some “secret information” in advance • They want to communicate a new message secretly. • The communication happens in public.
Steganography • Art of concealing the message in “innocent-looking” messages.
Steganography • Even the algorithm used by Alice and Bob
is hidden… • When is it useful? • What is wrong with it?
Kerckhoffs's principle
Caesar cipher (weak variant) • the th letter is substituted
with ( + ) th letter. • Is it secure?
Caesar Cipher (strong variant) • Secret key: a random permutation
over all letters. • Key size: log 26! > 88 bits • Is it now secure?