//img.uscri.be/pth/d31f8e4ac5b968abf2bf4e584f0b19493ca5b360
Cet ouvrage fait partie de la bibliothèque YouScribe
Obtenez un accès à la bibliothèque pour le lire en ligne
En savoir plus

Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion

De
147 pages
Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion Etude d'hypothèses algorithmiques et attaques de primitives cryptographiques Charles Bouillaguet École normale supérieure Paris, France Ph.D. Defense September 26, 2011

  • supérieure de paris

  • ecole normale

  • very brief


Voir plus Voir moins

Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
Etude d’hypothèses algorithmiques
et attaques de primitives cryptographiques
Charles Bouillaguet
École normale supérieure
Paris, France
Ph.D. Defense
September 26, 2011Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
A (Very Brief) Introduction to Cryptography: Encryption
??????Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
A (Very Brief) Introduction to Cryptography: Encryption
??????
!!!Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
A (Very Brief) Introduction to Cryptography: Encryption
5c14ff5cc3225fb9e5ae8919671e23b6
???Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
A (Very Brief) Introduction to Cryptography: Encryption
5c14ff5cc3225fb9e5ae8919671e23b6
???Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
A (Very Brief) Introduction to Cryptography: Encryption
5c14ff5cc3225fb9e5ae8919671e23b6
K K
???Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
A (Very Brief) Introduction to Cryptography: Encryption
5c14ff5cc3225fb9e5ae8919671e23b6
K K
??
???In the late ’70s, invention of public-key cryptography
Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
Secret-Key and Public-key Cryptography
I Alice and Bob used symmetric encryption
I They have the same secret key KIntroduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
Secret-Key and Public-key Cryptography
I Alice and Bob used symmetric encryption
I They have the same secret key K
In the late ’70s, invention of public-key cryptographyI (Computationally) impossible to extract
Secret Key from Public Key
I Need hard problems from mathematics
Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
Public-key Cryptography
PK SKbob bob
I The Public Key is sufficient to encrypt
I web page, public directory, . . .
I The Secret Key is necessary to decrypt
I personal!