crypt@b-it 2008
Vincent Rijmen
Design and analysis of block ciphers and cryptographic hash functions
Abstract
For block ciphers, I am planning to cover the following (not exactly in this order):
- brief intro to symmetric cryptography and the place that block ciphers take in it
- DES and AES
- a short overview of existing theories to design block ciphers
- modes of operation, security proofs for modes, tweaked block ciphers, ideal block ciphers, ...
- differential cryptanalysis (quite detailed in theory and in practice)
- linear cryptanalysis (shorter)
- design theories for block ciphers: Knudsen-Nyberg-Matsui's "provable security", Decorrelation, Wide Trail strategy
- Saturation attack (depending on time)
For hash functions, I plan:
- applications, requirements of hash functions
- MD4, MD5, SHA, SHA-1, SHA-256
- Chabaud-Joux attack on SHA
- Wang's attack on SHA-1; what is different between differential attacks on hash functions and dif. attacks on block ciphers
- some recent work of my group in Graz: automated tools to analyze SHA-like hash functions, meaningful collisions, second-preimage attacks, ...
Lecture notes
You can download the lecture notes here: