Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Topics in Cryptography
Search
Mohammad Mahmoody
January 19, 2018
Education
0
120
Topics in Cryptography
Session 01: A bird's view of the journey.
Mohammad Mahmoody
January 19, 2018
Tweet
Share
More Decks by Mohammad Mahmoody
See All by Mohammad Mahmoody
Class 26
mahmoody
0
23k
Class 25
mahmoody
0
23k
Class 21
mahmoody
0
7.9k
class 20
mahmoody
0
9.3k
Class 19
mahmoody
0
8.5k
Class 17
mahmoody
0
8.9k
Class 16
mahmoody
0
7.8k
Class 14
mahmoody
0
8.3k
Class 12
mahmoody
0
9.5k
Other Decks in Education
See All in Education
教員向け生成AI基礎講座(2025年3月28日 東京大学メタバース工学部 ジュニア講座)
luiyoshida
0
240
The Prison Industrial Complex by Billy Dee
oripsolob
0
830
女子商アプリ開発の軌跡
asial_edu
0
300
家族をスクラムチームに! アジャイルで取り組む家事と育児 | Install Scrum to Family
coosuke
PRO
1
250
Adobe Express
matleenalaakso
1
7.8k
Monaca Education 活用事例セミナー:「年間通してMonaca Educationを活用する授業実践のご報告」
asial_edu
0
250
Prógram La Liberazione
olafurtr90
0
180
Sanapilvet opetuksessa
matleenalaakso
0
32k
ハワイアン航空 ステータスへの道 #HAairstudy
maroon1st
0
140
生成AI時代教育とICT支援員への期待
o_ob
0
240
Avoin jakaminen ja Creative Commons -lisenssit
matleenalaakso
0
1.8k
Virtual and Augmented Reality - Lecture 8 - Next Generation User Interfaces (4018166FNR)
signer
PRO
0
1.6k
Featured
See All Featured
Code Review Best Practice
trishagee
67
18k
Imperfection Machines: The Place of Print at Facebook
scottboms
267
13k
Adopting Sorbet at Scale
ufuk
75
9.3k
VelocityConf: Rendering Performance Case Studies
addyosmani
328
24k
Art, The Web, and Tiny UX
lynnandtonic
298
20k
A Modern Web Designer's Workflow
chriscoyier
693
190k
Mobile First: as difficult as doing things right
swwweet
223
9.6k
Building a Scalable Design System with Sketch
lauravandoore
462
33k
Build The Right Thing And Hit Your Dates
maggiecrowley
34
2.6k
BBQ
matthewcrist
88
9.6k
Design and Strategy: How to Deal with People Who Don’t "Get" Design
morganepeng
129
19k
Building an army of robots
kneath
304
45k
Transcript
Special Topics in Cryptography Mohammad Mahmoody
Cryptography’s main goals
Secure communication
Historic Ciphers
Privacy / confidentiality
Integrity / Authentication
Integrity / Authentication
Not loosing in chess to the grand master
Tool: Pseudorandom (number) generators
Public Key Encryption Revolution (70’s)
Four main problems in cryptographic
Main tool for public-key cryptography: Number theory and structured mathematics
Beyond Encryption and Authentication
Multi-party Computation
Yao’s Billionaires Problem
Poker over the phone
Generalization: multi-party computation
Multiparty consensus mechanisms (and block-chain protocols …)
Weird useful tool: Zero Knowledge Proofs
More powerful forms of Encryption
Homomorphic Encryption
Searchable Encryption
And many more…
None
Encryption : Perfect secrecy and its limitations
None
Chapters 1-2 of Katz-Lindell book • Steganography and why it
is not a good idea • Defining Perfect Secrecy • Problems with perfect secrecy
Setting for private-key encryption schemes • Alice and Bob share
some “secret information” in advance • They want to communicate a new message secretly. • The communication happens in public.
Steganography • Art of concealing the message in “innocent-looking” messages.
Steganography • Even the algorithm used by Alice and Bob
is hidden… • When is it useful? • What is wrong with it?
Kerckhoffs's principle
Caesar cipher (weak variant) • the th letter is substituted
with ( + ) th letter. • Is it secure?
Caesar Cipher (strong variant) • Secret key: a random permutation
over all letters. • Key size: log 26! > 88 bits • Is it now secure?