Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Topics in Cryptography
Search
Mohammad Mahmoody
January 19, 2018
Education
0
89
Topics in Cryptography
Session 01: A bird's view of the journey.
Mohammad Mahmoody
January 19, 2018
Tweet
Share
More Decks by Mohammad Mahmoody
See All by Mohammad Mahmoody
Class 26
mahmoody
0
21k
Class 25
mahmoody
0
22k
Class 21
mahmoody
0
7.8k
class 20
mahmoody
0
9.2k
Class 19
mahmoody
0
8.5k
Class 17
mahmoody
0
8.7k
Class 16
mahmoody
0
7.8k
Class 14
mahmoody
0
8.2k
Class 12
mahmoody
0
9.4k
Other Decks in Education
See All in Education
Monaca Educationを活用したプログラミング授業実践
asial_edu
0
200
パフォーマンス・チューニング入門
oracle4engineer
PRO
2
550
phygital__le_magasin_augmenté.pdf
martine
0
2.6k
千葉県印西市立・原山小学校における新たな学び「情報探究の時間」実践報告』
codeforeveryone
1
680
全員参加型で会社を強くしていく活動を考えてみる
ikefukurou777
0
190
「小・中・高等学校における情報教育の体系的な学習を目指したカリキュラムモデル基本方針」
codeforeveryone
0
1.3k
3 занятие. Канва бизнес-модели #ideaNN 2.02.2024.
karlov
0
200
第1回全国商業高校Webアプリコンテスト総括
asial_corp
0
400
Railsチュートリアルの歩き方 (第7版)
yasslab
PRO
1
1M
5 занятие. Разбор метода "8 кубиков"бизнес-модели #ideaNN 16.02.2024.
karlov
0
180
SUMMER SCHOOL 2024
pnuslide
0
140
Copilotとして理解する生成AI利用の基本
gmoriki
0
130
Featured
See All Featured
Docker and Python
trallard
33
2.7k
個人開発の失敗を避けるイケてる考え方 / tips for indie hackers
panda_program
60
14k
Scaling GitHub
holman
457
140k
[Rails World 2023 - Day 1 Closing Keynote] - The Magic of Rails
eileencodes
1
1.3k
The Power of CSS Pseudo Elements
geoffreycrofte
59
5k
Building a Scalable Design System with Sketch
lauravandoore
455
32k
ピンチをチャンスに:未来をつくるプロダクトロードマップ #pmconf2020
aki_iinuma
76
41k
Become a Pro
speakerdeck
PRO
10
4.5k
Distributed Sagas: A Protocol for Coordinating Microservices
caitiem20
321
20k
How GitHub (no longer) Works
holman
304
140k
Clear Off the Table
cherdarchuk
83
310k
The Mythical Team-Month
searls
215
42k
Transcript
Special Topics in Cryptography Mohammad Mahmoody
Cryptography’s main goals
Secure communication
Historic Ciphers
Privacy / confidentiality
Integrity / Authentication
Integrity / Authentication
Not loosing in chess to the grand master
Tool: Pseudorandom (number) generators
Public Key Encryption Revolution (70’s)
Four main problems in cryptographic
Main tool for public-key cryptography: Number theory and structured mathematics
Beyond Encryption and Authentication
Multi-party Computation
Yao’s Billionaires Problem
Poker over the phone
Generalization: multi-party computation
Multiparty consensus mechanisms (and block-chain protocols …)
Weird useful tool: Zero Knowledge Proofs
More powerful forms of Encryption
Homomorphic Encryption
Searchable Encryption
And many more…
None
Encryption : Perfect secrecy and its limitations
None
Chapters 1-2 of Katz-Lindell book • Steganography and why it
is not a good idea • Defining Perfect Secrecy • Problems with perfect secrecy
Setting for private-key encryption schemes • Alice and Bob share
some “secret information” in advance • They want to communicate a new message secretly. • The communication happens in public.
Steganography • Art of concealing the message in “innocent-looking” messages.
Steganography • Even the algorithm used by Alice and Bob
is hidden… • When is it useful? • What is wrong with it?
Kerckhoffs's principle
Caesar cipher (weak variant) • the th letter is substituted
with ( + ) th letter. • Is it secure?
Caesar Cipher (strong variant) • Secret key: a random permutation
over all letters. • Key size: log 26! > 88 bits • Is it now secure?