Slides - Inria
Slides - Inria
Slides - Inria
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Private-Key Ciphersbased on Combinatorial DesignsCAIAF2011D. E. SimosPrivate-KeyCryptosystemsMotivationCryptographicAlgorithmsEncryptionSchemesCryptanalysisConclusionMotivationThe algorithms for encryption and decryption (in CombinatorialDesigns) are of reasonable lengthExploit the mathematical structure of the designs to harvestcryptographic design principlesSimilaritiesHill cipher, i.e. using the incidence matrix of a combinatorialdesign for encryption and decryptionBlock ciphers, i.e. Blowfish, 3DESDesign Goals1 Require the key be shared only once2 Use a relatively small key size3 Computationally fast4 Resistance to cryptographic attacks5 / 26