New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a groundbreaking paper on impossible differential cryptanalysis presented at Eurocrypt 2017. Delve into the new search tool developed by Yu Sasaki and Yosuke Todo, examining its design and cryptanalytic applications. Learn about the fundamentals of impossible differential attacks, their history, and the general methods employed. Understand the model block cipher, impossible-to-financial strength, and type structure. Examine the extended facial network, impossible differential assumptions, and a practical example. Conclude with insights on linear key schedules and the implications for modern cryptography.
Syllabus
Introduction
What is Impossible Differential Attack
New Impossible Differential
General Methods
History
Model Block Cipher
Impossible to Financial
Strengths
Type Structure
Illustration
Extended Facial Network
Impossible Differential
Assumptions
Middle
Example
Conclusion
Linear Key Schedule
Taught by
TheIACR
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera