- title:
- Error-Correcting Codes and Applications to Cryptography
Codes correcteurs d'erreurs et applications à la cryptographie - manager:
- Anne Canteaut
- ects:
- 3
- period:
- 1-2
- hours:
- 24
- weeks:
- 16
- hours-per-week:
- 1.5
- language:
- French by default
- lang:
- track:
- C
- themes:
- Cryptography
- order:
- 2.13.2
- successor:
- codes
- link:
- view
- [2.13.2]
- Error-Correcting Codes and Applications to Cryptography
Codes correcteurs d'erreurs et applications à la cryptographie
- Language:
- Period:
- 1-2.
- Duration:
- 24h (1.5h/week).
- ECTS:
- 3.
- Themes: Cryptography
- Manager:
- Anne Canteaut.
Instructors: Anne Canteaut (responsable), Alain Couvreur, Thomas Debris
Objectives
The aim of this course is to present common issues essential to the
theory of error-correcting codes and to cryptology (symmetric cryptography and public-key cryptosystems), with algorithmic and computational aspects.
English Policy
Lectures will be in French, but could be in English if some student asks for it.
Lecture notes are in English.
Prerequisite
First-year master level in standard algebra, algorithms and cryptology.
Sister courses: 2.12-1, 2.12-2, 2.30, 2.34.2 and 2.13.1.
**Preliminary schedule year 2024-2025**
Wednesday, from 8:45 to 10:15, building Sophie Germain, Room 1002
18/09 | Alain Couvreur | Introduction |
25/09 | Anne Canteaut | Finite Fields basics Exercises |
02/10 | Alain Couvreur | Decoding problems, Shannon theory |
09/10 | Alain Couvreur | Bounds on the parameters of codes |
16/10 | Alain Couvreur | Duality, MacWilliams identity |
23/10 | Alain Couvreur | Cyclic codes, BCH codes |
30/10 | no lecture | |
06/11 | Alain Couvreur | Reed-Solomon codes |
13/11 | Thomas Debris | Decoding as an intractable problem |
20/11 | Anne Canteaut | Exercises |
04/12 | mid-term exam | |
11/12 | Thomas Debris | Random codes and generic decoding algorithms |
18/12 | Thomas Debris | Code-based encryption schemes |
08/01 | Anne Canteaut | Reed-Muller codes, Boolean functions |
15/01 | Anne Canteaut | Algebraic attacks and statistical attacks on block ciphers |
22/01 | Anne Canteaut | Linear cryptanalysis |
29/01 | Anne Canteaut | Linearity of Sboxes |
05/02 | Anne Canteaut | Differential cryptanalysis |
12/02 | Anne Canteaut | Diffusion in block ciphers |
05/03 | final exam |
**Exams**
- Partial exam: December 4. Lecture notes are allowed.
- Final exam: March 5. The final exam will rely on a research paper given to the students 3 weeks in advance. The day of the exam, a list of questions related to the paper is handed.
Lecture notes are allowed.
The final grade is defined as the maximum between the grade of the final exam and the average of the grades of the partial exam and of the final exam.
Lecture Notes
- Chapter 0: Finite fields
- Coding theory: Lecture Notes
- Applications to symmetric cryptography: Lecture Notes
- Code-based cryptography Lecture Notes
Training
- Exercise Sheet 1 and their Solutions
- Exercise Sheet 2 and their Solutions
- Exercise Sheet 3 and their Solutions
- Exercise Sheet 4 and their Solutions
Annals
- Mid term exam 2014 and its solutions
- Mid term exam 2015 and its solutions
- Mid term exam 2016 and its solutions
- Mid term exam 2017 and its solutions
- Mid term exam 2018 and its solutions
- Mid term exam 2019 and its solutions
- Mid term exam 2020 and its solutions
- Mid term exam 2022 and its solutions
- Mid term exam 2023 and its solutions
- Mid term exam 2024 and its solutions
- Final exam 2016: paper by Sim et al. and the corresponding questions
- Final exam 2017: paper by Chepyzhov et al. and the corresponding questions
- Final exam 2018: paper by Johannson et al. and the corresponding questions
- Final exam 2019-20: paper by Sendrier and the corresponding questions
- Final exam 2020-21: paper by Carlet, Méaux and Rotella and the corresponding questions
- Final exam 2021-22: paper by Gupta, Pandey and Venkateswarlu
- Final exam 2022-23: paper by Edel and Pott
- Final exam 2023-24: paper by Johansson, Meier and Nguyen
Internships & Theses
- Internship with CryptoExperts, Paris: Generation of Masking Countermeasures Against Side-Channel Attacks
- Internship at IRISA, Rennes : New tools for quantum rebound attacks
- Three internship offers at PQShield:
- Internship at LORIA, Nancy: Estimation de la Probabilité d’un Distingueur Boomerang