Lecture

Modern Cryptography Milestones

In course
DEMO: id deserunt aliqua
Deserunt aliquip aliquip velit labore Lorem proident quis non quis sint consequat. Laboris excepteur aliquip ipsum consectetur exercitation culpa esse officia officia. Mollit anim sunt reprehenderit exercitation. Id dolore sit sit amet dolor sunt labore. Aliquip mollit voluptate nisi tempor aute reprehenderit cupidatat eiusmod.
Login to see this section
Description

This lecture delves into the evolution of modern cryptography, starting with the milestones such as the Visionary Cipher introducing secret keys, the shift from secret algorithms to secret keys, and the impact of Shannon's information theory. The lecture explores the Diffie-Hellman results, the standardization of encryption methods, and the transition from military to civilian encryption standards. It emphasizes the limitations of information theory in practical cryptography and the importance of complexity theory in assessing security. The lecture also covers the Vernam cipher, the Kirchhoff's principle, and the fundamental problems of data authentication, confidentiality, and integrity.

Instructor
eiusmod exercitation incididunt ut
Aute consectetur ipsum sunt Lorem consectetur consequat culpa enim aliqua aliquip irure officia dolor et. In ex tempor ex nostrud occaecat duis aliqua eu eiusmod ad qui sunt laboris nostrud. Nostrud mollit consequat magna pariatur labore do deserunt aliquip dolore ad minim. Proident anim eu velit deserunt aliquip. Ea commodo ea ullamco sit officia culpa proident ex.
Login to see this section
About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related lectures (70)
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Symmetric Encryption: Physical Limits
Explores the physical limits and security aspects of symmetric encryption schemes, including energy consumption, key recovery, and distinguisher security.
Ancient Cryptography: Security and Information Theory
Explores ancient cryptography, key security, perfect secrecy, and the Shannon encryption model.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Applied Cryptography: Symmetric Encryption and Hash Functions
Introduces symmetric encryption, hash functions, and their practical applications in cryptography.
Show more

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.