New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a groundbreaking paper on impossible differential cryptanalysis presented at Eurocrypt 2017. Delve into the new search tool developed by Yu Sasaki and Yosuke Todo, examining its design and cryptanalytic applications. Learn about the fundamentals of impossible differential attacks, their history, and the general methods employed. Understand the model block cipher, impossible-to-financial strength, and type structure. Examine the extended facial network, impossible differential assumptions, and a practical example. Conclude with insights on linear key schedules and the implications for modern cryptography.
Syllabus
Introduction
What is Impossible Differential Attack
New Impossible Differential
General Methods
History
Model Block Cipher
Impossible to Financial
Strengths
Type Structure
Illustration
Extended Facial Network
Impossible Differential
Assumptions
Middle
Example
Conclusion
Linear Key Schedule
Taught by
TheIACR
Related Courses
Cryptography IStanford University via Coursera Introduction to Cryptology
Indian Institute of Technology Roorkee via Swayam Symmetric Cryptography
University of Colorado System via Coursera Cyber Attack Countermeasures
New York University (NYU) via Coursera Криптографические методы защиты информации
National Research Nuclear University MEPhI via edX