11.07.2015 Views

Slides - Inria

Slides - Inria

Slides - Inria

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Private-Key Ciphersbased on Combinatorial DesignsCAIAF2011D. E. SimosPrivate-KeyCryptosystemsMotivationCryptographicAlgorithmsEncryptionSchemesCryptanalysisConclusionMotivationThe algorithms for encryption and decryption (in CombinatorialDesigns) are of reasonable lengthExploit the mathematical structure of the designs to harvestcryptographic design principlesSimilaritiesHill cipher, i.e. using the incidence matrix of a combinatorialdesign for encryption and decryptionBlock ciphers, i.e. Blowfish, 3DESDesign Goals1 Require the key be shared only once2 Use a relatively small key size3 Computationally fast4 Resistance to cryptographic attacks5 / 26

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!