Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the concepts of stream ciphers, buteforce inversion algorithms, subtle bruteforce inversion algorithms, and pushing the physical limits in cryptography. It delves into topics such as Linear Feedback Shift Register (LFSR), A5/1 stream cipher, key schedules, known weaknesses, exhaustive search algorithms, complexity analysis, key recovery games, and various attacks on symmetric encryption. The instructor discusses the security of passwords, key recovery games, application scenarios, and the role of salt in password recovery. Additionally, the lecture explores the complexity analysis of inversion attacks, multi-target dictionary inversion attacks, and time-memory tradeoffs in cryptographic algorithms.