Lecture

Public-Key Cryptography: Key Exchange and Signatures

In course
DEMO: aliqua ut fugiat mollit
Ex quis ullamco consectetur sit et laboris labore ex sint laborum. Ea quis officia amet labore mollit ea sit. Ipsum irure nulla minim nisi nisi sint incididunt dolor incididunt laborum tempor et dolor. Irure ut ex id incididunt. Ullamco eiusmod et ad non occaecat officia Lorem exercitation labore occaecat laboris. Officia qui elit aute in sint nisi consectetur duis excepteur cillum.
Login to see this section
Description

This lecture covers various aspects of public-key cryptography, focusing on key exchange and digital signatures. It starts with Diffie-Hellman key exchange, RSA cryptography, and ElGamal cryptography. The case study of Signal messaging app is used to illustrate the practical application of public-key cryptography. The lecture then delves into topics like the security mechanisms of public-key cryptography, including trapdoor permutations, probabilistic encryption, and mask generation functions. It also discusses the drawbacks and benefits of different signature schemes, such as RSA, DSA, and ElGamal. The instructor, Serge Vaudenay, explains the generation of public parameters for cryptographic schemes and highlights the importance of secure key lengths and post-quantum cryptography.

Instructor
tempor sit non
Culpa voluptate sit sunt sint culpa nostrud. Cillum dolor exercitation cillum officia est labore sint. Dolor incididunt nulla reprehenderit culpa sit qui fugiat laboris dolor laborum sint ut. Eiusmod excepteur officia voluptate incididunt esse. Amet veniam pariatur dolore excepteur pariatur aliqua laboris in duis aliqua. Ullamco eu ad aute exercitation officia. Minim ullamco ea est aute cillum.
Login to see this section
About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related lectures (163)
Anonymous Authorization: Privacy Engineering Toolbox
Covers anonymous authorization, zero-knowledge proofs, attribute-based credentials, and practical issues in anonymous authentication.
Distributed Randomness: Drand
Explores distributed randomness using Drand, covering cryptographic tools, key exchange, elliptic curve cryptography, and practical applications in blockchain systems.
Public-Key Cryptography: ECDSA and BLS
Explores ECDSA and BLS signature schemes, NFC credit card payment, and breaking RSA and DH cryptography.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Cryptography: Tools and Techniques
Explores cryptography basics, key exchange protocols, elliptic curve cryptography, and digital signatures for secure data transmission.
Show more

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.