Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Online Course: Cryptography by Dan Boneh - Introduction, Key Establishment, Signatures, an, Lecture notes of Network Theory

An introduction to an online cryptography course by Dan Boneh. The course covers various aspects of cryptography, including secret key establishment, digital signatures, anonymous communication, and more. The document also touches upon the importance of confidentiality and integrity in secure communication. Dan Boneh is a well-known computer scientist and cryptography expert.

Typology: Lecture notes

2019/2020

Uploaded on 06/25/2020

kassahuna
kassahuna 🇮🇳

2 documents

1 / 9

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Dan$Boneh$
Introduc/on$
What$is$cryptography?$
Online$ Cryptography$ Course$ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ Dan$ Boneh$
pf3
pf4
pf5
pf8
pf9

Partial preview of the text

Download Online Course: Cryptography by Dan Boneh - Introduction, Key Establishment, Signatures, an and more Lecture notes Network Theory in PDF only on Docsity!

Introduc/on

What is cryptography?

Online Cryptography Course Dan Boneh

Crypto core

Secret key establishment: Secure communica/on: a?acker??? k k confiden/ality and integrity m 1 m 2 Alice Bob Talking to Alice Talking to Bob

Alice

But crypto can do much more

  • Digital signatures
  • Anonymous communica/on
  • Anonymous digital cash
    • Can I spend a “digital coin” without anyone knowing who I am?
    • How to prevent double spending? Who was that? Internet

(anon. comm.)

Protocols

  • Elec/ons
  • Private auc/ons

Crypto magic

  • Privately outsourcing computa/on
  • Zero knowledge (proof of knowledge) Alice search query What did she search for? results I know the factors of N !! proof π ??? E[ query ] E[ results ] Alice N=p·∙q Bob

N

A rigorous science

The three steps in cryptography:

  • Precisely specify threat model
  • Propose a construc/on
  • Prove that breaking construc/on under threat mode will solve an underlying hard problem