Tag Archives: Cryptoanalysis

Cryptography: what is it and its uses

Cryptography: what is it and its uses

Cryptography, or crypto, refers to the technique of securing information and communications through codes. By doing so, only those people you send information holding the decoding key to can understand it and process it. Cryptography concerns the construction and the analysis of protocols that prevent third parties or the public from reading messages meant to remain private. Thus it prevents unauthorized access to the given information. Indeed, The prefix “crypt” means “hidden, secret,” and suffix “-graphy” means “writing.” Cryptography is an ancient art. Since its dawn, humanity has developed and used it to convey secretly and, to an extent, securely messages concerning military operations, espionage, bargains, and simple messaging between […]

War and cryptography: the challenge of quantum communication

War and cryptography: the challenge of quantum communication

Message encryption has always been a very important tool within the military, stretching back to the time of the ancient Greeks to the present day. It is natural for two armies in war to seek information about each other, both to learn about enemy strategies before battle, as well as to discover its movements during it. In order to obtain this information, “cryptoanalysis” was born, that is the study of decrypting encrypted messages without knowing their encryption key. It is easy to assume that if an army, through cryptoanalysis, manages to decipher the enemy’s communications, it can gain a fundamental strategic advantage. To be precise, it must be specified that […]

ON THE CONDITION NUMBER OF THE VANDERMONDE MATRIX OF THE nTH CYCLOTOMIC POLYNOMIAL

ON THE CONDITION NUMBER OF THE VANDERMONDE MATRIX OF THE nTH CYCLOTOMIC POLYNOMIAL

Edoardo Signorini is an undergraduate student who is currently working on various projects in Telsy, while writing his thesis about the “Post Quantum Cryptography”. Furthermore, he also published his work together with two professors of the Polytechnic of Turin, Carlo Sanna and Antonio Jose’ Di Scala, as a part of the amazing job that he is doing within the Company. Following the abstract: Recently, Blanco-Chac´on proved the equivalence between the Ring Learning With Errors and Polynomial Learning With Errors problems for some families of cyclotomic number fields by giving some upper bounds for the condition number Cond(Vn) of the Vandermonde matrix Vn associated to the nth cyclotomic polynomial. We prove […]

Telsy Event: “An overview on cryptanalysis of ARX ciphers”

Telsy Event: “An overview on cryptanalysis of ARX ciphers”

Telsy has organized the following event in collaboration with the University of Turin: “An overview on cryptanalysis of ARX ciphers” The event will take place on 22 on November, at Turin University (Aula 2), in ‘’Via Carlo Alberto 10’’ Following, a short abstract: ‘’ We present some features of block ciphers based on the three operations: addition mod 2n, rotation and XOR (ARX ciphers) and themain cryptanalytic attacks obtained by developing the methods underlying differential cryptanalysis. We focus on the recent tecnique of rotational-XOR differential cryptanalysis giving some ideas of this attack and its application to SPECK 32/64.’’ Have a look here for more info

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close