« This course is available in « Open Archived » mode: there is no animation of the pedagogical team (no forum or rated exercises such as quizzes) and the course does not deliver any certificate of successful completion or certificate. However, you have unlimited access to the videos and text resources. This mode of distribution allows you, while waiting for the opening of a future "animated session", to train yourself by having access to the main contents. Note that this is a subject close to research, and the field has evolved since the MOOC's creation. This evolution will continue. Everything that is said remains accurate and provides a good basis for anyone interested in the subject, but the gap with the state of the art is increasing over time.»
About This Course
We all use cryptography in our daily lives. The security of the most popular Public-Key Cryptosystems are based either on the hardness of factoring or the presumed intractability of the discrete logarithm problem. Advances on these problems or the construction of large quantum computers would dramatically change the landscape: Code-Based Cryptography is a powerful and promising alternative.
The objective of this course is to present the state of the art of these cryptosystems. This MOOC covers the essentials that you should know about this hot topic in Cryptography and Coding Theory: the security-reduction proofs, the possible attacks, several proposals to reduce the key-size, etc.
Week 1: Error-Correcting Codes and Cryptography
Week 2: McEliece Cryptosystem
Week 3: Message Attacks (ISD)
Week 4: Key Attacks
Week 5: Other cryptographic constructions relying on coding theory