Conclusions - PowerPoint PPT Presentation

About This Presentation
Title:

Conclusions

Description:

Transposition, substitution, linear ciphers, one-time pad, ... HMAC, birthday attacks, Nostradamus attack, MD4, MD5. Conclusions 4. Summary. Public key systems ... – PowerPoint PPT presentation

Number of Views:60
Avg rating:3.0/5.0
Slides: 7
Provided by: marks9
Learn more at: http://www.cs.sjsu.edu
Category:

less

Transcript and Presenter's Notes

Title: Conclusions


1
Conclusions
2
Summary
  • Applied cryptanalysis attacks that produce
    plaintext and/or recover keys
  • We studied applied attacks on
  • Classic ciphers
  • Transposition, substitution, linear ciphers,
    one-time pad, codebook, etc.
  • WWII cipher machines
  • Enigma, Purple, Sigaba

3
Summary
  • Stream ciphers
  • Shift registers, correlation attack, ORYX, RC4,
    PKZIP
  • Block ciphers
  • Modes, MAC, Feistel cipher, Hellmans TMTO, CMEA,
    Akelarre, FEAL
  • Cryptographic Hash functions
  • HMAC, birthday attacks, Nostradamus attack, MD4,
    MD5

4
Summary
  • Public key systems
  • Overview of Knapsack, Diffie-Hellman,
    Arithmetica, RSA, Rabin, NTRU, ElGamal
  • Public key attacks
  • Factoring algorithms trial division, Dixons
    algorithm, quadratic sieve
  • Discrete log algorithms trial multiplication,
    baby step giant step, index calculus
  • RSA timing attacks Kochers, Schindlers,
    Brumley-Boneh
  • RSA glitching attack

5
Secure Ciphers
  • There are many secure ciphers
  • No significant shortcut attack known
  • Symmetric ciphers
  • Stream cipher RC4 (when used properly)
  • Block cipher AES
  • Public key systems
  • RSA, Diffie-Hellman, etc.

6
Applied Cryptanalysis
  • Many other ciphers where attacks are only
    theoretical
  • In this course, you learned
  • To analyze ciphers and attacks
  • To analyze algorithms, in general
  • Intro to cryptography
  • Foundation for further study
Write a Comment
User Comments (0)
About PowerShow.com