Explore the intricacies of cryptanalysis in authenticated encryption schemes through this comprehensive 53-minute session. Delve into the techniques and methodologies used to analyze and potentially break encryption systems that provide both confidentiality and authenticity. Gain insights into the vulnerabilities and strengths of various authenticated encryption algorithms, and understand the importance of robust cryptographic design in securing sensitive information. Learn about the latest advancements in cryptanalytic attacks and their implications for modern cybersecurity practices.
Overview
Syllabus
session-28: Cryptanalysis of authenticated encryption schemes
Taught by
TheIACR