La lecture à portée de main
Découvre YouScribe en t'inscrivant gratuitement
Je m'inscrisDécouvre YouScribe en t'inscrivant gratuitement
Je m'inscrisDescription
Sujets
Informations
Publié par | pefav |
Nombre de lectures | 29 |
Langue | English |
Poids de l'ouvrage | 7 Mo |
Extrait
Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
Etude d’hypothèses algorithmiques
et attaques de primitives cryptographiques
Charles Bouillaguet
École normale supérieure
Paris, France
Ph.D. Defense
September 26, 2011Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
A (Very Brief) Introduction to Cryptography: Encryption
??????Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
A (Very Brief) Introduction to Cryptography: Encryption
??????
!!!Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
A (Very Brief) Introduction to Cryptography: Encryption
5c14ff5cc3225fb9e5ae8919671e23b6
???Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
A (Very Brief) Introduction to Cryptography: Encryption
5c14ff5cc3225fb9e5ae8919671e23b6
???Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
A (Very Brief) Introduction to Cryptography: Encryption
5c14ff5cc3225fb9e5ae8919671e23b6
K K
???Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
A (Very Brief) Introduction to Cryptography: Encryption
5c14ff5cc3225fb9e5ae8919671e23b6
K K
??
???In the late ’70s, invention of public-key cryptography
Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
Secret-Key and Public-key Cryptography
I Alice and Bob used symmetric encryption
I They have the same secret key KIntroduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
Secret-Key and Public-key Cryptography
I Alice and Bob used symmetric encryption
I They have the same secret key K
In the late ’70s, invention of public-key cryptographyI (Computationally) impossible to extract
Secret Key from Public Key
I Need hard problems from mathematics
Introduction Modes of Operation AES Cryptanalysis Multivariate Cryptanalysis Conclusion
Public-key Cryptography
PK SKbob bob
I The Public Key is sufficient to encrypt
I web page, public directory, . . .
I The Secret Key is necessary to decrypt
I personal!