Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Impossible Plaintext Cryptanalysis and Probable Plaintext Collision Attacks of 64-Bit Block Ci

TheIACR via YouTube

Overview

Explore the intricacies of cryptanalysis and collision attacks in this 27-minute conference talk from FSE 2013. Delve into David McGrew's presentation on impossible plaintext cryptanalysis and probable plaintext collision attacks of 64-bit block ciphers. Examine topics such as simple models, Bayesian analysis, expected number of blocks, and real-world implications. Investigate leaks, counter mode, and multiple known plaintext scenarios. Gain insights into more sophisticated models, target values, and reasonable attack practices. Conclude with a discussion on hybrid approaches and key takeaways in the field of cryptography and information security.

Syllabus

Outline
Simple model
Indicator
Indistinct
Bayesian analysis
What does it work
Expected number of blocks
Loglog plot
Real world
Leaks
Limit number of blocks
Counter mode
Multiple known plaintext
Capital epsilon
More sophisticated model
Target values
Repeated values
Repeated target values
Reasonable attack
Practice
Hybrid
Conclusions

Taught by

TheIACR

Reviews

Start your review of Impossible Plaintext Cryptanalysis and Probable Plaintext Collision Attacks of 64-Bit Block Ci

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.