Introduction to Security
The goal of this course is to present basic notions ofcryptography such as confidentiality, authenticity, and integrity.After a quick presentation of historical ciphers, we will cover the difference between public-key and secret-key cryptography, the security level of cryptographic schemes, security protocol and key distribution. We will also study notions of entropy for passwords security.
- Cryptography goals
- Historical ciphers
- Public-key vs. secret-key cryptography
- Mode of operations for symmetric schemes
- Stream cipher and Wifi
- Security Levels
- Security Protocols
- Key distribution and key exchange
Confidentiality, authentication, integrity, public-key and secret-key cryptography.
- New Directions in Cryptography, by Whitfield Diffie and Martin E. Hellman, 1976
- A method for obtaining digital signatures and public-key cryptosystems, by Ronald L. Rivest, Adi Shamir and Leonard Adleman, 1978
- Handbook of Applied Cryptography, by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, 1996
- Cryptographie, théorie et pratique (2nd edition), by Douglas Stinson, 2003
Pierre-Alain Fouque is a Researcher Professor at the University of Rennes 1 and the Scientific Director of the CyberSchool. His research involves symmetrical public-key cryptography, proof of security protocols used in real life such as TLS or Signal, attacks by auxiliary canals, and the development of automatic attack detection tools by learning. His research is carried out at IRISA.