Logo
MOOC

Code-based Cryptography

Explore the future of secure communication with Code-Based Cryptography!

Fermé

16 mars 2015

🇬🇧

English

CC BY-NC-ND

Ce cours est fermé sur FUN et n'est plus accessible

Course description

This archived course remains open to registrations although it is not facilitated by the course teachers: its contents are no longer updated and may therefore no longer be up to date. The last version of this Mooc Code-Based Cryptography dates back to June 2016. If you register, you can freely consult the read-only resources but all collaborative spaces are closed (forums, wiki and other collaborative exercises): you cannot interact with the teaching team or with other learners. Furthermore, you will not be able to obtain an attestation of achievement for this course.

We all use cryptography in our daily lives. The security of the most popular Public-Key Cryptosystems are based either on the hardness of factoring or the presumed intractability of the discrete logarithm problem. Advances on these problems or the construction of large quantum computers would dramatically change the landscape: Code-Based Cryptography is a powerful and promising alternative.

The objective of this course is to present the state of the art of these cryptosystems. This MOOC covers the essentials that you should know about this hot topic in Cryptography and Coding Theory: the security-reduction proofs, the possible attacks, several proposals to reduce the key-size, etc.

Who is this course for?

This course is intended for Undergraduate and Master's degree students in mathematics or computer science.

Postgraduate students and researchers from the disciplines of computer algebra, coding theory and cryptography can also benefit from this course.

More widely, mathematicians, physicists or engineers interested in information and communication technologies and every person who wants to know more about cryptography, coding theory or code-based cryptography can be interested in this course

Course outline

  • Module 1: Error-Correcting Codes and Cryptography
  • Module 2: McEliece Cryptosystem
  • Module 3: Message Attacks (ISD)
  • Module 4: Key Attacks
  • Module 5: Other cryptographic constructions relying on coding theory

Pedagogical team

Authors:

  • Irene MARQUEZ CORBELLA, Post-doctoral researcher of FSMP (Fondation Sciences Mathématiques de Paris), Inria
  • Nicolas SENDRIER, Ph.D (1991) & "Habilitation à Diriger des Recherches" (2002), Université Paris 6
  • Matthieu FINIASZ, Ph.D (2004), Inria

Pedagogical support:

  • Christelle MARIAIS, Learning engineer, Inria Learning Lab
  • Isabelle Rey, Learning engineer, Inria Learning Lab
Voir le cours