Published On Premiered Oct 6, 2024
Slides in this video:
https://drive.google.com/file/d/1uBJr...
Slides of previous talks:
https://drive.google.com/drive/u/1/fo...
[ Timestamps ]
00:00:00 Hi
00:01:34 Introduction
00:19:43 History
00:34:04 Symmetric Cryptography
01:31:25 Asymmetric Cryptography
02:22:17 Lightweight Cryptography (LWC)
02:36:08 Post-Quantum Cryptography (PQC)
[ Content ]
Introduction
Whoami: Crypto Reasrch Intern at ERI, rest is on LinkedIn
[ / mohamed-tarek-159a821ba ]
Agenda
Definition
General model
Objectives
Applications
History
Caesar Cipher
Breaking Caesar
Rod Cipher
Table substitution ciphers
Arabs contribution
Symmetric Cryptogrpahy
Claude Shannon
Kerchoff's principle
General idea behind cryptanalysis
General idea behind symmetric ciphers
IBM: Feistal, DES
NIST: 2-DES, 3-DES, AES (Rijndael)
Modes of Operations
Hash functions
Authenticated Encryption: GCM
Asymmetric
General idea and objective
Hybrid systems
Diffie-Hellman key exchange
DH attacks
RSA cryptosytem: encryption, signature
RSA Padding schemes:
RSA Attacks (first appearnace of lattice)
ElGamal cryptosystem: encryption, signature
ElGamal attacks
ECC
ECC attacks
We'll not talk about crypto protocols (e.g: TLS)
Lightweight Cryptography (LWC)
NIST 10 finalists
Ascon: M24 paper, playascon
Post-Quantum Cryptography
Shor's algorithm
PQC approaches
Lattice-based and LWE crypto
Kyber PKE
FO Transform
Security Models (Games: CPA, CCA)
Kyber KEM, ML-KEM