Mathematics, Cryptology, Security
نویسنده
چکیده
In this talk, I will review some of the work performed by the research community in cryptology and security since the invention of public key cryptography by Diffie and Hellman in 1976. This community has developped many challenging lines of research. I will only focus on some of these, and moreover I will adopt an extremely specific perspective: for each chosen example, I will try to trace the original mathematics that underly the methods in use. Over the years, maybe due to my original training as a mathematician, I have come to consider that linking recent advances and challenges in cryptology and security to the work of past mathematicians is indeed fascinating. The range of examples will span both theory and practice: I will show that the celebrated RSA algorithm is intimately connected to mathematics that go back to the middle of the XVIIIth century. I will also cover alternatives to RSA, the method of ”provable security”, as well as some aspects of the security of electronic payments.
منابع مشابه
Some Aspects of Cryptology Teaching
Cryptology is a mathematical hard core of information security, since many of the information security problems (e.g. confidentiality, integrity, authenticity of information) can be (and often are) solved by means of cryptographical tools/algorithms. We analyse 20 selected academic courses in cryptology with respect to their aims, scopes, contents, organisation and literature used/recommended t...
متن کاملBASES AND CIRCUITS OF FUZZIFYING MATROIDS
In this paper, as an application of fuzzy matroids, the fuzzifying greedy algorithm is proposed and an achievableexample is given. Basis axioms and circuit axioms of fuzzifying matroids, which are the semantic extension for thebasis axioms and circuit axioms of crisp matroids respectively, are presented. It is proved that a fuzzifying matroidis equivalent to a mapping which satisfies the basis ...
متن کاملA Public Key Cryptosystem Based on Singular Cubic Curve
An efficient and semantically secure public key cryptosystem based on singular cubic curve is proposed in this paper. It is about two times faster than the cryptosystem of David at the same security label and more efficient than the Koyama scheme at high security level. Further, the partially known plaintext attack and the linearly related plaintext attacks are analyzed and concluded that those...
متن کاملSecurity Proofs for the BLT Signature Scheme
We present security proofs for the BLT signature scheme in the model, where hash functions are built from ideal components (random oracles, ideal ciphers, etc.). We show that certain strengthening of the Pre-image Awareness (PrA) conditions like boundedness of the extractor, and certain natural properties (balancedness and the so-called output one-wayness) of the hash function are sufficient fo...
متن کاملOn Post-Modern Cryptography
This essay relates to a recent article of Koblitz&Menezes that “criticizes several typical ‘provable security’ results” and argues that the “theorem-proof paradigm of theoretical mathematics is often of limited relevance” to cryptography. Although it should be obvious that these claims are utterly wrong, we undertake articulating this triviality. In particular, we point out some of the fundamen...
متن کامل