Main Menu

Symposia

Abstracts

Block Schedule

Forms

Committee




Francais

Printer friendly page


Short-course on Cryptography / Mini-cours : " Cryptologie "


NEAL KOBLITZ, University of Washington, Seattle, Washington  98195, USA
Introduction to elliptic curve cryptography

I will introduce the basic ideas of Elliptic Curve Cryptography, describe its advantages over competing systems, and discuss both cryptosystems constructed by analogy with systems based on the multiplicative group of a finite field and also cryptosystems based on the particular properties of elliptic curves.

MIKE MOSCA, Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario  N2L 3G1
Quantum computing and quantum cryptography

Information is stored in a physical medium and manipulated by physical processes, so any meaningful theory of information processing (including communication and computation) must refer, at least implicitly, to a realistic physical theory.

Early in the last century, physicists discovered that a new framework was necessary in order to explain basic physical phenomena. This framework is called quantum mechanics. Quantum computation and quantum cryptography are the natural consequences of considering computation and cryptography in this quantum mechanical framework.

Quantum computers seek to exploit the quantum mechanical properties of the bits that comprise them in order to solve problems with a computational complexity much lower than that of the best known classical computer algorithms.

The consequences of quantum theory for cryptography cannot be ignored. E.g. computationally secure cryptography requires that no reasonable algorithmic process could solve a specific computational problem in a feasible amount of time. If quantum theory enables an adversary to solve such problems efficiently, then we can no longer rely on these assumptions.

Quantum theory also offers new primitives for cryptography, such as intrinsic eavesdropper detection which leads to "unconditionally secure" quantum key establishment.

In this lecture, I will describe the basics of quantum information, and summarize the impact on computation and cryptography.

DOUG STINSON, University of Waterloo, Waterloo, Ontario  N2L 3G1
Introduction to cryptography

In this talk, I will give a brief overview of the objectives of cryptography and the tools that are used to achieve these objectives. A short history of the development of modern cryptography will be presented. The evolution of the notion of "security" will be discussed. Some recent trends in cryptography will be mentioned, as well as some possible future directions. This is a relatively non-technical talk.

HUGH WILLIAMS, University of Calgary
Cryptography and number theory

In the last 25 years, computational number theory and cryptography have become closely intertwined. For example, the security of almost all commercially available public-key cryptosystems is based on the presumed difficulty of some mathematical problems such as the integer factorization problem in computational number theory. Number theory provides most of the hard computational problems used to provide the security of cryptographic schemes

In this talk I will describe several techniques, which owe their origin to the application of number theory to cryptography, that have been successfully applied to classical problems arising in computational number theory. In particular, I will discuss the integer factoring problem, the discrete logarithm problem, and the primality testing problem.

 


top of page
Copyright © Canadian Mathematical Society - Société mathématique du Canada.
Any comments or suggestions should be sent to - Commentaires ou suggestions envoyé à: eo@cms.math.ca.