Code-Based Cryptography

Description

 

We all use cryptography in our daily lives. The security of the most popular Public-Key Cryptosystems are based either on the hardness of factoring or the presumed intractability of the discrete logarithm problem. Advances on these problems or the construction of large quantum computers would dramatically change the landscape: Code-Based Cryptography is a powerful and promising alternative.

The objective of this course is to present the state of the art of these cryptosystems. This MOOC covers the essentials that you should know about this hot topic in Cryptography and Coding Theory: the security-reduction proofs, the possible attacks, several proposals to reduce the key-size, etc.

 

TARGETED AUDIENCE

This course is intended for undergraduate and Master’s degree students in mathematics or computer science.

Postgraduate students and researchers from the disciplines of computer algebra, coding theory and cryptography can also benefit from this course.

More widely, mathematicians, physicists or engineers interested in information and communication technologies and every person who wants to know more about cryptography, coding theory or code-based cryptography can be interested in this course.

 

PRE-REQUISITES

Knowledge about linear algebra, finite field and complexity theory is required.

 

COURSE SYLLABUS

Click on a link below to access the videos of the course.

Part 1: Error-Correcting Codes and Cryptography

Part 2: McEliece Cryptosystem

Part 3: Message Attacks (ISD)

Part 4: Key Attacks

Part 5: Other cryptographic constructions relying on coding theory

The material of this course come from a MOOC delivered on France Université Numérique : https://www.fun-mooc.fr/courses/inria/41006S02/session02/about

 

  

Collections

5.1. Code-Based Digital Signatures
collection
7 vidéos

5: Other cryptographic constructions relying on coding theory

  • MARQUEZ-CORBELLA Irene
  • SENDRIER Nicolas
  • FINIASZ Matthieu
Table of contents 5.1. The Courtois-Finiasz-Sendrier (CFS) Construction 5.2. Attacks against the CFS Scheme 5.3. Parallel-CFS 5.4. Stern’s Zero-Knowledge Identification Scheme 5.5. An Efficient Provably Secure One-Way Function 5.6. The Fast Syndrome-Based (FSB) Hash Function
05.05.2015
  • niveau 1 niveau 2 niveau 3
  • document 1 document 2 document 3