Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture by the instructor covers the physical limits of symmetric encryption, including the energy bill for encryption, the Grover algorithm, and fully reversible encryption. It delves into the security aspects of key recovery, nonce-based encryption, and security against decryption. The lecture also discusses the ideal cipher concept, distinguisher security, and various types of symmetric encryption schemes. Additionally, it explores the differences between stream ciphers and block ciphers, as well as the importance of message authentication codes and hash functions in ensuring data integrity and authentication.