<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1 plus MathML 2.0 plus SVG 1.1//EN" "http://www.w3.org/2002/04/xhtml-math-svg/xhtml-math-svg.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
  <head>
    <meta http-equiv="Content-Type" content="application/xhtml+xml; charset=utf-8"/>
    <title>Team:CRYPT</title>
    <link rel="stylesheet" href="../static/css/raweb.css" type="text/css"/>
    <meta name="description" content="Overall Objectives - State of the Art"/>
    <meta name="dc.title" content="Overall Objectives - State of the Art"/>
    <meta name="dc.subject" content=""/>
    <meta name="dc.publisher" content="INRIA"/>
    <meta name="dc.date" content="(SCHEME=ISO8601) 2014-01"/>
    <meta name="dc.type" content="Report"/>
    <meta name="dc.language" content="(SCHEME=ISO639-1) en"/>
    <meta name="projet" content="CRYPT"/>
    <!-- Piwik -->
    <script type="text/javascript" src="/rapportsactivite/piwik.js"></script>
    <noscript><p><img src="//piwik.inria.fr/piwik.php?idsite=49" style="border:0;" alt="" /></p></noscript>
    <!-- End Piwik Code -->
  </head>
  <body>
    <div class="tdmdiv">
      <div class="logo">
        <a href="http://www.inria.fr">
          <img style="align:bottom; border:none" src="../static/img/icons/logo_INRIA-coul.jpg" alt="Inria"/>
        </a>
      </div>
      <div class="TdmEntry">
        <div class="tdmentete">
          <a href="uid0.html">Team Crypt</a>
        </div>
        <span>
          <a href="uid1.html">Members</a>
        </span>
      </div>
      <div class="TdmEntry">Overall Objectives<ul><li><a href="./uid3.html">Presentation</a></li><li class="tdmActPage"><a href="./uid7.html">State of the Art</a></li></ul></div>
      <div class="TdmEntry">Research Program<ul><li><a href="uid11.html&#10;&#9;&#9;  ">Public-Key Cryptanalysis</a></li><li><a href="uid15.html&#10;&#9;&#9;  ">Secret-Key Cryptanalysis</a></li></ul></div>
      <div class="TdmEntry">New Results<ul><li><a href="uid19.html&#10;&#9;&#9;  ">Highlights of the Year</a></li></ul></div>
      <div class="TdmEntry">Partnerships and Cooperations<ul><li><a href="uid21.html&#10;&#9;&#9;  ">National Initiatives</a></li><li><a href="uid30.html&#10;&#9;&#9;  ">European Initiatives</a></li><li><a href="uid33.html&#10;&#9;&#9;  ">International Initiatives</a></li><li><a href="uid41.html&#10;&#9;&#9;  ">International Research Visitors</a></li></ul></div>
      <div class="TdmEntry">Dissemination<ul><li><a href="uid47.html&#10;&#9;&#9;  ">Promoting Scientific Activities</a></li><li><a href="uid65.html&#10;&#9;&#9;  ">Teaching - Supervision - Juries</a></li><li><a href="uid76.html&#10;&#9;&#9;  ">Popularization</a></li></ul></div>
      <div class="TdmEntry">
        <div>Bibliography</div>
      </div>
      <div class="TdmEntry">
        <ul>
          <li>
            <a id="tdmbibentmajor" href="bibliography.html">Major publications</a>
          </li>
          <li>
            <a id="tdmbibentyear" href="bibliography.html#year">Publications of the year</a>
          </li>
          <li>
            <a id="tdmbibentfoot" href="bibliography.html#References">References in notes</a>
          </li>
        </ul>
      </div>
    </div>
    <div id="main">
      <div class="mainentete">
        <div id="head_agauche">
          <small><a href="http://www.inria.fr">
	    
	    Inria
	  </a> | <a href="../index.html">
	    
	    Raweb 
	    2014</a> | <a href="http://www.inria.fr/en/teams/crypt">Presentation of the Team CRYPT</a></small>
        </div>
        <div id="head_adroite">
          <table class="qrcode">
            <tr>
              <td>
                <a href="crypt.xml">
                  <img style="align:bottom; border:none" alt="XML" src="../static/img/icons/xml_motif.png"/>
                </a>
              </td>
              <td>
                <a href="crypt.pdf">
                  <img style="align:bottom; border:none" alt="PDF" src="IMG/qrcode-crypt-pdf.png"/>
                </a>
              </td>
              <td>
                <a href="../crypt/crypt.epub">
                  <img style="align:bottom; border:none" alt="e-pub" src="IMG/qrcode-crypt-epub.png"/>
                </a>
              </td>
            </tr>
            <tr>
              <td/>
              <td>PDF
</td>
              <td>e-Pub
</td>
            </tr>
          </table>
        </div>
      </div>
      <!--FIN du corps du module-->
      <br/>
      <div class="bottomNavigation">
        <div class="tail_aucentre">
          <a href="./uid3.html" accesskey="P"><img style="align:bottom; border:none" alt="previous" src="../static/img/icons/previous_motif.jpg"/> Previous | </a>
          <a href="./uid0.html" accesskey="U"><img style="align:bottom; border:none" alt="up" src="../static/img/icons/up_motif.jpg"/>  Home</a>
          <a href="./uid11.html" accesskey="N"> | Next <img style="align:bottom; border:none" alt="next" src="../static/img/icons/next_motif.jpg"/></a>
        </div>
        <br/>
      </div>
      <div id="textepage">
        <!--DEBUT2 du corps du module-->
        <h2>Section: 
      Overall Objectives</h2>
        <h3 class="titre3">State of the Art</h3>
        <p>Cryptanalysis has a long history, dating back to secret writing.
Until the seventies, most of the work on cryptanalysis was kept secret,
but it is has now evolved from art to science, thanks to the liberalization of cryptologic research.
In general, cryptanalysis tries to answer the following question:
what is the best attack against a given cryptosystem,
and how much does it cost?
There is generally no definite answer to this question,
and the state-of-the-art regularly evolves over time.
Cryptanalysis is a field mixing theory and practice:
while more and more advanced techniques are used,
one is also concerned with very applied issues
such as hardware/software efficiency.</p>
        <p>In the past fifteen years, a new kind of attacks have appeared in the research literature:
side-channel attacks. Such attacks arguably existed long before 1996,
but were not advertised in public research.
In a side-channel attack, the attacker exploits physical information
which can sometimes be obtained in a concrete implementation, such as
the power consumption of the cryptographic device,
or the running time of the cryptographic process, etc.
The attack could be either passive or active: for instance,
in a so-called fault attack, the attacker physically perturbates the cryptographic device,
and depending on the type of perturbations,
the faulty outputs may disclose valuable information
which may leak the whole secret key.
Side-channel attacks have had a huge impact in industry:
many cryptographic certifications now require more or less strong resistance
to side-channel attacks, and there is an annual international conference dedicated to side-channel attacks,
namely the CHES conference organized by IACR.</p>
        <p>Cryptanalysis is particularly important in secret-key cryptography,
due to the lack of provable security techniques.
In public-key cryptanalysis, studying the best attack often consists in answering the following two questions:</p>
        <ul>
          <li>
            <p class="notaparagraph"><a name="uid8"> </a>What is the best algorithm to solve the computational problem
(integer factoring, discrete logarithm, etc.)
related to the security of the public-key cryptosystem?
In particular, industry is very interested in a practical version of this question:
which keysizes are recommended?
How much computational effort would be required exactly to break a given keysize?
This question is arguably well-understood for integer factoring and discrete logarithm:
there is more or less a consensus on what is the security level
provided by a given RSA modulus or ECC elliptic curve.
But it is more difficult to answer for alternative (post-quantum) problems such as lattice reduction,
solving systems of polynomial equations over finite fields,
and coding theory problems.
Traditionally, there are more parameters for these problems.</p>
          </li>
          <li>
            <p class="notaparagraph"><a name="uid9"> </a>Is there a short-cut to attack the public-key cryptosystem,
rather than trying to solve the underlying computational problem stated by the designer(s)?
This is especially relevant when the public-key cryptosystem
does not have provable security guarantees.
And this question is also related to side-channel attacks.</p>
          </li>
        </ul>
      </div>
      <!--FIN du corps du module-->
      <br/>
      <div class="bottomNavigation">
        <div class="tail_aucentre">
          <a href="./uid3.html" accesskey="P"><img style="align:bottom; border:none" alt="previous" src="../static/img/icons/previous_motif.jpg"/> Previous | </a>
          <a href="./uid0.html" accesskey="U"><img style="align:bottom; border:none" alt="up" src="../static/img/icons/up_motif.jpg"/>  Home</a>
          <a href="./uid11.html" accesskey="N"> | Next <img style="align:bottom; border:none" alt="next" src="../static/img/icons/next_motif.jpg"/></a>
        </div>
        <br/>
      </div>
    </div>
  </body>
</html>
