kirv_4.mp4 10 min about Crypto-Book project A: 00:00:00 - 00:49:32 50min almost no break B: 00:50:00 - 01:14:52 25min 2min break C: 01:18:30 - 01:49:10 6min 2min vrtanje D: 01:18:30 - 01:49:10 12min 5min break E: 01:58:27 - 02:31:35 33min +5min (RSA intro and projects) ---------------------------------------------------------------------------- A: 0-49:32 (1:23:28) (50min) 00:00 Substitution-Permutation Network (SPN) 02:24 E.g. $\ell=m=N_r=4$ and specific permutations $\pi_S$ and $\pi_S$ (determining what is their order - we write a permutation in a form of disjoint cycles and calculating lcm of their lengths) 07:45 Key schedule algorithm 08:30 An example of a specific plaintex encryptions 09:30 Description of AES 13:30 We need to introduce finite fields (called Galois Fields, GF) 14:00 Repeating the definition of a group 16:40 Solving an equation in a group 17:45 The definition of a finite field $F$ with binary operations + and * 20:20 In a group we did not mention commutativity property, so we have to write two distributivity properties 22:15 Example: prime fields $Z_p$ 23:00 The smallest field has two elements: $Z_2=\{0,1\}$ 24:00 We make an infinite process in a finite field (like when we were studying stream ciphers) in note that there has to be some repeatitions: $k\cdot 1=\h\cdot 1$. Now suppose that $k,h \in \N_0$, $k {\rm deg}(r)$ (like we were using for numbers their size). 1:28:57 Operation ShiftRows 1:29:48 Algorithm MixColumns 1:30:09 Algorithm KeyExpansions (by RotWord and SubWord) 1:31:00 Description of DES: Feistel Cipher based on 1:34:10 DES constants 1:34:37 DES function $f$ (not necessarily invertible) 1:36:30 S-boxes 1:38:28 Computation of the DES Keys 1:40:19 Test vectors 1:40:40 Modes of Operation of Symmetric Ciphers 1:41:30 Electronic Code Book mode (ECB) 1:42:36 Cipher Block Chaining mode (CBC) 1:44:20 Cipher FeedBack mode (CFB) and MAC (an example of hash function) 1:46:20 Output FeedBack mode (OFB) 1:48:00 Counter mode (CTR) - 1:49:10 break (5min) E: 01:58:27-02:31:35 (33min+5min) 1:58:27 Attacks on DES (Differential and Linear Cryptoanalysis) 2:06:00 2:07:00 3-DES (why not 2-DES) 2:13:15 How big is BIG 2:15:40 Computing Power and the size of the secure key-space $2^{80}$ 2:19:00 DESX 2:22:49 Man-in-the-middle attack (MIMA) on 2-DES 2:23:26 Differential Cryptoanalysis 2:31:35 RSA System and Factorization 2:36:40