Skip to content

KZHU.ai 馃殌

Into the Unknown

Menu
  • 馃搱 Discrete Optimization
    • Mathematics
    • Computer Science
    • Cryptography
    • C++
  • 鈿涳笍 Quantum Computing
    • Physics
    • Blockchain
  • 馃 Machine Learning
    • TensorFlow
    • Python
  • 馃洶 Data Science
    • Statistics
    • Matlab
  • 馃對 Hybrid Cloud
    • Kubernetes
    • Golang
    • Web
  • 馃搱 Business
    • MBA @ Gies
    • Six Sigma
  • 馃彟 Finance
    • Law
    • Economics
Menu

Category: Cryptography

Certificate Cryptography

My #90 course certificate from Coursera

Posted on April 24, 2022October 19, 2022 by keslerzhu

CryptographyUniversity of Maryland College Park This course is definitely one of the best that you shouldn’t miss out on. It is a wide-ranging course covering tons of topics, meanwhile many of them are taught in depth. I love the syllabus, the pace, and the internal logic among different modules. Learning this course is an amazing…

Read more
Public key distribution under attack, SSL/TLS handshake protocol

Public Key Infrastructures & SSL/TLS

Posted on April 23, 2022November 10, 2022 by keslerzhu

An attacker can try to manipulate the public key distribution process. In particular nothing prevents an attacker from inserting attacker’s public key pk* into the public database but claiming other’s name in order to overwrite the original public key pk. Moreover, the attacker may prevent or block the communication from any party from reaching the…

Read more
Identification scheme, Fiat-Shamir transform, Schnorr Identification scheme

Discrete Logarithm Based Digital Signature

Posted on April 22, 2022November 10, 2022 by keslerzhu

Identification Schemes Identification schemes are extremely important as building block for digital signature scheme. An identification scheme is a protocol that is running in the public key setting. There are two parties: prover and verifier. Prover Generates a pair of public and private keys.Publicize their public keys. Verifier Obtain authentic copy of the prover’s public…

Read more
Digital Signature, Plain RSA Signature

Digital Signature

Posted on April 21, 2022November 10, 2022 by keslerzhu

Digital signature is a mechanism that can be used to provide integrity in the public key setting, analogous to message authentication codes in the private key setting. However there is some key differences between the both. How does digital signature work? Digital signature Public key encryption Sender Party has the private key Party has the…

Read more
El Gamel Encryption, Plain RSA Encryption

Public Key Encryption

Posted on April 19, 2022November 10, 2022 by keslerzhu

A public-key encryption scheme is composed of three probabilistic polynomial time algorithms: Gen The key-generation algorithm that on input 1n (where n is security parameter), outputs public key pk, and private key sk. Enc Encryption algorithm that on input pk and a message m, outputs a cipher text c. Dec Decryption algorithm that on input…

Read more
Diffie-Hellman Key Exchange

Public Key Revolution

Posted on April 14, 2022November 10, 2022 by keslerzhu

A New Direction in Cryptography Recall that the private-key cryptography allows two users who share a secret to establish a “secure channel” which is a way to communicate with both secrecy and integrity. But the problem is that the need to share this secret key incurs several drawbacks. “Classical” private key cryptography offers no solution…

Read more

Factoring, RSA, Discrete-Logarithm and Diffie-Hellman

Posted on April 7, 2022October 26, 2022 by keslerzhu

Problems like addition, multiplication, modular arithmetic, exponentiation can be solved in polynomial time, so they are seen as easy problem. Factoring a random number seems not hard, because 50% of the time, random number is even; 1/3 of the time, random number is divisible by 3. But the problem of factoring some special numbers can…

Read more

Number Theory and Group Theory

Posted on April 4, 2022October 26, 2022 by keslerzhu

Number theory studies integers and operation on them. Basics of number theory have natural application, like addition, subtraction, etc. However advanced number theory topic has been praised as a branch of pure mathematics, mathematics for itself. This does not mean the number theory is useless. Things changed dramatically in computer era. … virtually every theorem…

Read more
A fixed-length message authentication codes, authenticated encryption.

Message Authentication Codes & Authenticated Encryption

Posted on March 3, 2022November 10, 2022 by keslerzhu

Besides the secrecy of communication, we also need to be concerned with integrity, which ensures that a message received by the receiver, originated from the intended sender, and was not modified, even if an attacker controls the channel. The standard error-correction techniques are not enough, because here we are not concerned with random errors, instead…

Read more
Chosen plaintext attacks secure encryption, Proof by reduction

Private Key Encryption

Posted on February 25, 2022November 10, 2022 by keslerzhu

Limitations of Perfect Secrecy Recall that the perfect secrecy has two limitations: The first limitation can be circumvented by relaxing the notion of perfect secrecy to computational secrecy. In particular, the pseudo one time pad scheme allows parties to securely encrypt a very long message using a short key. In order to circumvent the second…

Read more
Pseudo one-time pad, distinguisher, proofs by reduction

Computational Secrecy, Pseudo-randomness, and Proof of Security

Posted on February 10, 2022November 1, 2022 by keslerzhu

Limitations of the One-Time Pad The one-time pad encryption scheme achieves perfect secrecy, but nowadays it is not often used because of several limitations: The key is as long as the message. Only secure if each key is used to encrypt a single message. Actually these limitations are not specific to the one-time pad scheme,…

Read more

Introduction to Classical Cryptography

Posted on February 4, 2022October 27, 2022 by keslerzhu

In dictionary, cryptography is defined as the art of writing or solving codes. Historically, cryptography focused exclusively on codes (or private-key encryption schemes) ensuring secret communication between two parties who share secret in advance. Modern cryptography however has a much broader scope like data integrity, user authentication, protocols, etc. Furthermore cryptography also considers the public-key…

Read more

American Contract Law I Andrew Ng Anna Koop Brenda Gunderson Christopher Millard Computer Communications Specialization Cryptography Economics of Money and Banking Evgenii Vashukevich Garud Iyengar Ivan Vybornyi Jeffrey Chasnov John Daily Jonathan Katz Kevin Webster Ling-Chieh Kung Machine Learning: Algorithms in the Real World Martin Haugh Mathematics for Engineers Specialization Matthew Hutchens Michael Donohoe Michael Fricke Microsoft Azure Fundamentals AZ-900 Exam Prep Specialization Operations Research (3): Theory Perry Mehrling Petro Lisowsky Physical Basics of Quantum Computing Practical Reinforcement Learning Rebekah May Search Engine Optimization (SEO) Specialization Sergey Sysoev Statistical Thermodynamics Specialization Statistics with Python Specialization Taxation of Business Entities I: Corporations TensorFlow 2 for Deep Learning Specialization U.S. Federal Taxation Specialization Wounjhang Park Xiaobo Zhou Yi Wang 小褘褋芯械胁 小械褉谐械泄 小械褉谐械械胁懈褔

Subscribe to our newsletter!

© 2025 KZHU.ai 馃殌 | Powered by Superbs Personal Blog theme

Privacy Policy - Terms and Conditions