|
|
|
||
Last update: T_KA (14.05.2013)
|
|
||
Last update: Dr. rer. nat. Faruk Göloglu (15.02.2022)
Advances in Cryptology, Springer-Verlag, svazky LNCS 1403, 1440, 1592, jde o sborníky z konferencí EUROCRYPT. |
|
||
Last update: Dr. rer. nat. Faruk Göloglu (15.02.2022)
1-3. Elementary building blocks: hash functions, encrypting/decrypting transformations, signing/verifying transformations. Brute force attacks, existence and searching for attacks which would be more feasible than the brute force ones. Properties of the elementary cryptographic transformations, weak keys, intentional generating of weak keys, individual bits theorems.
4. Random number generators. Cryptanalytic attacks on pseudorandom generators, possible defects of physical generators. Prediction and influencing of sequences being generated.
5. Main results of side-channels theory. Data processing of timing, power and electromagnetic measurements.
6. Symmetric encryption schemes. Attacks on stream and block ciphers. Classification of attacks, gaming description, attacks involved by properties of particular encryption modes of operation. 7. Asymmetric encryption schemes. Classification of attacks, gaming description. Encoding of messages being encrypted.
8. Special schemes for key distribution and key agreement. Passive and active attacks.
9. Message authentication (integrity) schemes. Attacks on a CBC based MAC. Cryptanalytic properties of HMAC construction.
10. Signature schemes. Classification of attacks, gaming description. Signature forgery.
11. Non-repudiation of digital signatures. Formal description of an alternative explanation strategy. Message and key collisions.
12. Higher level protocols attacks. How a combination of several cryptographic techniques influences a cryptanalytic resistance. Encrypt-then-Authenticate and Authenticate-then-Encrypt constructions, consequences.
13. Reserved |