Presentation
This module introduces the mathematical and algorithmical bases of cryptography. Cryptographic techniques allow information to be transmitted confidentially (numbering) and with guarantees of integrity (signature)on non-securised channels of communication. We present the main cryptographic techniques (symmetric and asymmetric cryptography), thier mathmatical basis , and their resistance to certain types of attack.
Duration:
12h
Organization
Scheduled activities
- C1 (1h30) crypto à clé publique (exemple de RSA)
- C2 (1h30) cryptographie Symétrique (exemple de AES)
- TP 1 (3h) RSA (génération des clés, chiffrement, déchiffrement)
- C3 (1h30) théorie de l'information (entropie, distance d'unicité, longueurs de clés)
- C4 (1h30) protocoles cryptographiques (preuves sans transfert de connaissance)
- TP 2 (3h) exemple de cryptanalyse: attaque par corrélations de LFSR couplés en parallèle
Team
|