YoVDO

Impossible Plaintext Cryptanalysis and Probable Plaintext Collision Attacks of 64-Bit Block Ci

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Cryptography Courses Block Ciphers Courses Cryptanalysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of cryptanalysis and collision attacks in this 27-minute conference talk from FSE 2013. Delve into David McGrew's presentation on impossible plaintext cryptanalysis and probable plaintext collision attacks of 64-bit block ciphers. Examine topics such as simple models, Bayesian analysis, expected number of blocks, and real-world implications. Investigate leaks, counter mode, and multiple known plaintext scenarios. Gain insights into more sophisticated models, target values, and reasonable attack practices. Conclude with a discussion on hybrid approaches and key takeaways in the field of cryptography and information security.

Syllabus

Outline
Simple model
Indicator
Indistinct
Bayesian analysis
What does it work
Expected number of blocks
Loglog plot
Real world
Leaks
Limit number of blocks
Counter mode
Multiple known plaintext
Capital epsilon
More sophisticated model
Target values
Repeated values
Repeated target values
Reasonable attack
Practice
Hybrid
Conclusions


Taught by

TheIACR

Related Courses

Cryptography I
Stanford University via Coursera
Introduction to Cryptology
Indian Institute of Technology Roorkee via Swayam
Symmetric Cryptography
University of Colorado System via Coursera
Cyber Attack Countermeasures
New York University (NYU) via Coursera
Криптографические методы защиты информации
National Research Nuclear University MEPhI via edX