نظرة عامة على التشفير منذ البداية حتى التشفير ما بعد الكم | Walkthrough World of Cryptography
Mohamed Tarek Mohamed Tarek
624 subscribers
225 views
19

 Published On Premiered Oct 6, 2024

Slides in this video:
https://drive.google.com/file/d/1uBJr...

Slides of previous talks:
https://drive.google.com/drive/u/1/fo...

[ Timestamps ]
00:00:00 Hi
00:01:34 Introduction
00:19:43 History
00:34:04 Symmetric Cryptography
01:31:25 Asymmetric Cryptography
02:22:17 Lightweight Cryptography (LWC)
02:36:08 Post-Quantum Cryptography (PQC)

[ Content ]
Introduction
Whoami: Crypto Reasrch Intern at ERI, rest is on LinkedIn
[  / mohamed-tarek-159a821ba  ]
Agenda
Definition
General model
Objectives
Applications

History
Caesar Cipher
Breaking Caesar
Rod Cipher
Table substitution ciphers
Arabs contribution

Symmetric Cryptogrpahy
Claude Shannon
Kerchoff's principle
General idea behind cryptanalysis
General idea behind symmetric ciphers
IBM: Feistal, DES
NIST: 2-DES, 3-DES, AES (Rijndael)
Modes of Operations
Hash functions
Authenticated Encryption: GCM

Asymmetric
General idea and objective
Hybrid systems
Diffie-Hellman key exchange
DH attacks
RSA cryptosytem: encryption, signature
RSA Padding schemes:
RSA Attacks (first appearnace of lattice)
ElGamal cryptosystem: encryption, signature
ElGamal attacks
ECC
ECC attacks
We'll not talk about crypto protocols (e.g: TLS)

Lightweight Cryptography (LWC)
NIST 10 finalists
Ascon: M24 paper, playascon

Post-Quantum Cryptography
Shor's algorithm
PQC approaches
Lattice-based and LWE crypto
Kyber PKE
FO Transform
Security Models (Games: CPA, CCA)
Kyber KEM, ML-KEM

show more

Share/Embed