YoVDO

Impossible Plaintext Cryptanalysis and Probable Plaintext Collision Attacks of 64-Bit Block Ci

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Cryptography Courses Block Ciphers Courses Cryptanalysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of cryptanalysis and collision attacks in this 27-minute conference talk from FSE 2013. Delve into David McGrew's presentation on impossible plaintext cryptanalysis and probable plaintext collision attacks of 64-bit block ciphers. Examine topics such as simple models, Bayesian analysis, expected number of blocks, and real-world implications. Investigate leaks, counter mode, and multiple known plaintext scenarios. Gain insights into more sophisticated models, target values, and reasonable attack practices. Conclude with a discussion on hybrid approaches and key takeaways in the field of cryptography and information security.

Syllabus

Outline
Simple model
Indicator
Indistinct
Bayesian analysis
What does it work
Expected number of blocks
Loglog plot
Real world
Leaks
Limit number of blocks
Counter mode
Multiple known plaintext
Capital epsilon
More sophisticated model
Target values
Repeated values
Repeated target values
Reasonable attack
Practice
Hybrid
Conclusions


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera