A Tutorial on High Performance Computing Applied to Cryptanalysis - (Invited Talk Abstract)
نویسنده
چکیده
Cryptology and computers have a long common history; in fact, some of the early computers were created as cryptanalytic tools. The development of faster and widely deployed computers also had a great impact on cryptology, allowing modern cryptography to become a practical tool. Today, both computers and cryptology are not only practical, but they have became ubiquitous tools. In truth, computing devices incorporating cryptography features range from very small low-end devices to supercomputer, going through all possible intermediate sizes; these devices include both general purpose computing devices and specific, often embedded, processors which enable computing and security features in hundreds of technological objects. In this invited talk, we mostly consider the cryptanalytic side of things, where it is fair to use very large amounts of computing power to break cryptographic primitives or protocols. As a consequence, demonstrating the feasibility of new cryptanalytic methods often requires large scale computations. Most articles describing such cryptanalyses usually focus on the mathematical or algorithmic advances and gloss over the implementation details, giving only sufficient data to show that the computations are feasible. The goal of the present abstract is to give an idea of the difficulty facing implementers of large scale cryptanalytic attacks. Computers and cryptanalysis have a long common history. This is wellemphasized by the location of this Eurocrypt conference located near Bletchley Park, the home of the UK code-breaking during World War II. In particular, the park features a working replica of the first digital computer, the Colossus and of the Turing-Welchman Bombe, which was initially developed for cryptanalytic purposes. The organization of the park itself reflects the duality of computers and cryptanalysis. Indeed, the park hosts two museums, the “National Codes and Ciphers Centre” and the “National Museum of Computing”.
منابع مشابه
Mechanical Properties of Irregular Fiber (Invited Review Paper)
Irregularities are inherent to virtually all fibers, including the conventional textile fibers, the high-performance brittle fibers and newly developed nano-fibers. These irregularities can fall into two main categories: dimensional or geometrical irregularity (external) and structural irregularity (internal). For natural fibers such as wool, diameter variation along fiber length is atypical ex...
متن کاملTrends in High-Performance Computing
The Annual Boole Lecture was established and is sponsored by the Boole Centre for Research in Informatics, the Cork Constraint Computation Centre, the Department of Computer Science, and the School of Mathematics, Applied Mathematics and Statistics at University College Cork. The series is named in honour of George Boole, the first professor of Mathematics at UCC, whose seminal work on logic in...
متن کاملThe Impact of Imagery on Self-efficacy and Volleyball Spike Performance: Mediating Role of Positive Self-talk
The aim of this study is to determine the impact of imagery on self-efficiency and spike implementation of girl volleyball players in Tafresh, considering the mediating role of positive self-talk. For this purpose, in a non-equivalent pretest-posttest control group design, 45 female football players aged 17-25 with sports record of 6 months to 2 years were selected out of high schools and uni...
متن کاملThe Boole Lecture Trends in High Performance Computing
The Annual Boole Lecture was established and is sponsored by the Boole Centre for Research in Informatics, the Cork Constraint Computation Centre, the Department of Computer Science, and the School of Mathematics, Applied Mathematics and Statistics at University College Cork. The series is named in honour of George Boole, the first professor of Mathematics at UCC, whose seminal work on logic in...
متن کاملTowards Fair and Efficient Evaluations of Leaking Cryptographic Devices - Overview of the ERC Project CRASH, Part I (Invited Talk)
Extended abstract. Side-channel analysis is an important concern for the security of cryptographic implementations, and may lead to powerful key recovery attacks if no countermeasures are deployed. Therefore, various types of protection mechanisms have been proposed over the last 20 years. In view of the cost and performance overheads caused by these protections, their fair evaluation is a prim...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012