Lattice-based cryptography | Public-key encryption schemes

GGH encryption scheme

The Goldreich–Goldwasser–Halevi (GGH) lattice-based cryptosystem is an asymmetric cryptosystem based on lattices. There is also a GGH signature scheme. The Goldreich–Goldwasser–Halevi (GGH) cryptosystem makes use of the fact that the closest vector problem can be a hard problem. This system was published in 1997 by Oded Goldreich, Shafi Goldwasser, and Shai Halevi, and uses a trapdoor one-way function which relies on the difficulty of lattice reduction. The idea included in this trapdoor function is that, given any basis for a lattice, it is easy to generate a vector which is close to a lattice point, for example taking a lattice point and adding a small error vector. But to return from this erroneous vector to the original lattice point a special basis is needed. The GGH encryption scheme was cryptanalyzed (broken) in 1999 by . Nguyen and Oded Regev had cryptanalyzed the related GGH signature scheme in 2006. (Wikipedia).

Video thumbnail

Network Security: Classical Encryption Techniques

Fundamental concepts of encryption techniques are discussed. Symmetric Cipher Model Substitution Techniques Transposition Techniques Product Ciphers Steganography

From playlist Network Security

Video thumbnail

Cryptanalysis of Classical Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Message Authentication Codes: Part 1

Message Authentication MACs based on Hash Functions: HMAC MACs based on Block Ciphers: DAA and CMAC Authenticated Encryption: CCM and GCM Pseudorandom Number Generation Using Hash Functions and MACs

From playlist Network Security

Video thumbnail

Message Authentication Codes: Part 2

Message Authentication MACs based on Hash Functions: HMAC MACs based on Block Ciphers: DAA and CMAC Authenticated Encryption: CCM and GCM Pseudorandom Number Generation Using Hash Functions and MACs

From playlist Network Security

Video thumbnail

Block Ciphers and Data Encryption Standard (DES) - Part 1

Fundamental concepts of Block Cipher Design Principles are discussed. DES is presented. Differential and linear cryptanalysis are explained . Block Cipher Principles Data Encryption Standard (DES) Differential and Linear Cryptanalysis Block Cipher Design Principles

From playlist Network Security

Video thumbnail

ADFGVX Cipher: Encryption and Decryption (OLD VERSION: SEE NEW VERSION LINK BELOW)

This video has been replaced with an updated video: visit https://youtu.be/T0xfKiU9Rr4 Encryption and Decryption of the World War One ADFGVX Cipher, through examples.

From playlist Classical Cryptography

Video thumbnail

Transport Layer Security: Part 1

Fundamental concepts of TLS are discussed. SSL is analyzed. HTTPS & SSH are presented.

From playlist Network Security

Video thumbnail

Jonathan Katz - Introduction to Cryptography Part 1 of 3 - IPAM at UCLA

Recorded 25 July 2022. Jonathan Katz of the University of Maryland presents "Introduction to Cryptography I" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: This lecture will serve as a "crash course" in modern cryptography for those with no prior exposure

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

Some Secure Computation concepts by Manoj Prabhakaran

DISCUSSION MEETING : FOUNDATIONAL ASPECTS OF BLOCKCHAIN TECHNOLOGY ORGANIZERS : Pandu Rangan Chandrasekaran DATE : 15 to 17 January 2020 VENUE : Madhava Lecture Hall, ICTS, Bangalore Blockchain technology is among one of the most influential disruptive technologies of the current decade.

From playlist Foundational Aspects of Blockchain Technology 2020

Video thumbnail

Adeline Roux-Langlois : Using structured variants in lattice-based cryptography - Lecture 1

CONFERENCE Recording during the thematic meeting : « Francophone Computer Algebra Days» the March 06, 2023 at the Centre International de Rencontres Mathématiques (Marseille, France) Filmmaker: Jean Petit Find this video and other talks given by worldwide mathematicians on CIRM's Audiov

From playlist Mathematical Aspects of Computer Science

Video thumbnail

Jonathan Katz - Introduction to Cryptography Part 2 of 3 - IPAM at UCLA

Recorded 25 July 2022. Jonathan Katz of the University of Maryland presents "Introduction to Cryptography II" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: This session will focus on public-key cryptography, including key exchange, public-key encryption,

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

PCP and Delegating Computation: A Love Story - Yael Tauman Kalai

Computer Science/Discrete Mathematics Seminar I Topic: PCP and Delegating Computation: A Love Story Speaker: Yael Tauman Kalai Affiliation: Microsoft Research Date: January 28, 2019 For more video please visit http://video.ias.edu

From playlist Mathematics

Video thumbnail

Delegating computation via no-signaling strategies – Yael Kalai – ICM2018

Mathematical Aspects of Computer Science Invited Lecture 14.4 Delegating computation via no-signaling strategies Yael Kalai Abstract: Efficient verification of computation, also known as ‘delegation of computation’, is one of the most fundamental notions in computer science, and in parti

From playlist Mathematical Aspects of Computer Science

Video thumbnail

(Almost) Unbreakable Crypto | Infinite Series

Viewers like you help make PBS (Thank you 😃) . Support your local PBS Member Station here: https://to.pbs.org/donateinfi Despite what many believe, the essence of encryption isn’t really about factoring or prime numbers. So what is it about? Thanks to Vanessa Hill for playing the part of

From playlist Cryptography 101

Video thumbnail

CERIAS Security: Minimizing Trust Liabilities in Secure Group Messaging Infrastructures 4/5

Clip 4/5 Speaker: Himanshu Khurana · University of Illinois at Urbana-Champaign Large-scale collaborative applications are characterized by a large number of users and other processing end entities that are distributed over geographically disparate locations. Therefore, these applicat

From playlist The CERIAS Security Seminars 2005 (1)

Video thumbnail

Adeline Roux-Langlois : Using structured variants in lattice-based cryptography - Lecture 2

CONFERENCE Recording during the thematic meeting : « Francophone Computer Algebra Days» the March 07, 2023 at the Centre International de Rencontres Mathématiques (Marseille, France) Filmmaker : Guillaume Hennenfent Find this video and other talks given by worldwide mathematicians on CIR

From playlist Mathematical Aspects of Computer Science

Video thumbnail

Matrix Groups (Abstract Algebra)

Matrices are a great example of infinite, nonabelian groups. Here we introduce matrix groups with an emphasis on the general linear group and special linear group. The general linear group is written as GLn(F), where F is the field used for the matrix elements. The most common examples

From playlist Abstract Algebra

Related pages

Lattice reduction | GGH signature scheme | Lattice-based cryptography | Lattice (group) | Cryptosystem | Unimodular matrix | Public-key cryptography | Trapdoor function