1 The Future of Cryptography Salil Vadhan Harvard University.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

CS555Spring 2012/Topic 171 Cryptography CS 555 Topic 17: Textbook RSA encryption.
Course summary COS 433: Crptography -Spring 2010 Boaz Barak.
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
The Complexity of Zero-Knowledge Proofs Salil Vadhan Harvard University.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography and Security: The Narrow Road from Theory to Practice Burt Kaliski, RSA Security ISPEC 2006, Hangzhou, China April 13, 2006.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CIS 5371 Cryptography 3b. Pseudorandomness.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
1 CIS 5371 Cryptography 4. Collision Resistant Hash Functions B ased on: Jonathan Katz and Yehuda Lindell Introduction to Modern Cryptography.
An In-Depth Examination of PKI Strengths, Weaknesses and Recommendations.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
CMSC 456 Introduction to Cryptography
Cryptography Basic (cont)
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Mid-term Review Network Security. Secure channel SSL (and many others:incl. IPSEC) Shared key establishing Trusted party (Kerberos, etc. - to be covered)
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Lecture 3: Cryptographic Tools
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
1 CSE 5351: Introduction to Cryptography Ten H. Lai Spring 2015 MW 3:55-5:15 PM, CL133.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
1 CIS 5371 Cryptography 3. Private-Key Encryption and Pseudorandomness B ased on: Jonathan Katz and Yehuda Lindel Introduction to Modern Cryptography.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
Crypto Bro Rigby. History
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
CS 4/585: Cryptography Tom Shrimpton FAB
James Higdon, Sameer Sherwani
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Topic 22: Digital Schemes (2)
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
Chapter 21 Public-Key Cryptography and Message Authentication.
Primitive Operations. Communication Operations –Reader to tag Read Write –Tag to Tag Read Write Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256,
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 23/10/2015 | pag. 2.
Class 5 Channels and Preview CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
1 CIS 5371 Cryptography 4. Message Authentication Codes B ased on: Jonathan Katz and Yehuda Lindell Introduction to Modern Cryptography.
Cryptography Fundamentals
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Elliptic Curve Cryptography
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 2 Chapter 3 (sections ) You may skip proofs, but are.
Cryptography Gerard Klonarides. What is cryptography? Symmetric Encryption Symmetric Encryption Asymmetric Encryption Asymmetric Encryption Other cryptography.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
The Pairing Based Cryptography and IBE Standards Effort.
Introduction to Modern Cryptography Sharif University Spring 2016 Data and Network Security Lab Sharif University of Technology Department of Computer.
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
1 Original Message Scrambled Message Public Key receiver Internet Scrambled+Signed Message Original Message Private Key receiver The Process of Sending.
Cryptography and Network Security
Course summary COS 433: Crptography -Spring 2010 Boaz Barak.
CRYPTOGRAPHY קריפטוגרפיה Thu 15:45-18:15.
Presentation transcript:

1 The Future of Cryptography Salil Vadhan Harvard University

2 Research in Cryptography: Traditional View Design Algorithms Prove/Evaluate Security Security Applications RSA DSS AES+modes SHA-1 ׃

3 Research in Cryptography Design Algorithms Prove/Evaluate Security Security Applications Formulate Tasks Understand Limits Define Security Find Building Blocks Encryption Signatures Zero-Knowledge Pfs Secure Multiparty Comp. Electronic Voting Identity-Based Encryption ׃ Factoring Elliptic Curves DES, AES MD5, SHA-1 One-Way Functions ׃ 8 adversaries with resources X and access Y “feasibility” results impossibility theorems concurrency/composibility ׃ Number Theory Complexity Theory Formal Methods

4 How the Cybertrust Community can Benefit Methodology/understanding as useful as actual constructions. Accessible textbooks on modern crypto,eg Katz & Lindell Consult cryptographers when using crypto primitives, doing protocol design. Recognize that going from theory to practice is sometimes a long process.