Teachers
team (click to send an e-mail)
Jean-Louis Roch
|
This page gives the material related to the lectures on the part "Security Proofs" of the Master SCCI course
"Security models: proofs, protocols and politics"
For rules and exams, see the main page of the course.
Note for M2R SECR students: see the related assignments page.
Latex model
for the lecture notes by the students.
Planning of the lectures
The lectures present the foundations of provable security in relation with complexity.
- Introduction: computationally, provably, unconditionally secure; Attack models; Probabilities
- Entropy and perfect secret/unconditional secure cryptosystem
- Provably secure cryptosystem - One-way functions. Polynomial reductions
- One-way hash function
- Pseudo-random generators
- Probabilistic algorithm - Interactive proofs
- Zero-knowledge protocols
- lecture 1
Chap 1. Introduction: computationally, provably, unconditionally secure; Attack models; Probabilities
Perfect secret/unconditional secure cryptosystem (proof of Shannon's lower bound). Vernam cipher; extension to an arbitrary group.
- lectures 2 and 3.
Provably secure cryptosystem. Polynomial reduction. P, NP, co-NP classes.
Links between one-way funtions and complexity.
Links between one-way trapdoor funtions and complexity.
Discrete exponential and logarithm.
one way function and one-way trap-door function. Example: Merkle-Hellman
- Sanjeev Arora, Boaz Barak, Computational complexity. A modern approach
Chap 9, Cryptography [Draft]
lecture 4 One-way hash function
lecture 5 One-way hash function (Part 3 1h30)
- Part 2 (1h30). Keyed-hash functions.
Strongly univeral hash families; Unconditionally secure message authentication codes (MAC).
Oracle model and (e,q)-adversary.
Application to provable security nested-HMAC.
- slides lecture 4 - part 2.
- Training exercises on hash functions
- Continuous control training: 2011 partial exam
lecture 6
Pseudo-Random Generators (part 1)
lecture 7
Provably secure Pseudo-random generators (part 2)
lectures 8 and 9
Probabilistic algorithm and Interactive proofs
Zero-knowledge protocols
lecture 10
Zero-knowledge protocols (end).
Conclusion lecture: security proofs of other protocols. This lecture illustrates
the application of the techniques of provable security covered
by the previous lectures by applying them to other protocols:
Some previous final exams: December 2012
Course material, lecture notes, cooperation and cheating,...
|