Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the use of symmetric cryptography for confidentiality, including stream ciphers, block ciphers, and their modes of operation. It explains the concept of symmetric encryption, the importance of initialization vectors, and the security arguments behind stream ciphers. The lecture also delves into different modes of operation such as Electronic Code Book (ECB), Cipher Block Chaining (CBC), and Counter Mode (CTR), highlighting their strengths and weaknesses.