<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1 plus MathML 2.0 plus SVG 1.1//EN" "http://www.w3.org/2002/04/xhtml-math-svg/xhtml-math-svg.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
  <head>
    <meta http-equiv="Content-Type" content="application/xhtml+xml; charset=utf-8"/>
    <title>Project-Team:GRACE</title>
    <link rel="stylesheet" href="../static/css/raweb.css" type="text/css"/>
    <meta name="description" content="Application Domains - Cryptography and Cryptanalysis"/>
    <meta name="dc.title" content="Application Domains - Cryptography and Cryptanalysis"/>
    <meta name="dc.subject" content=""/>
    <meta name="dc.publisher" content="INRIA"/>
    <meta name="dc.date" content="(SCHEME=ISO8601) 2016-01"/>
    <meta name="dc.type" content="Report"/>
    <meta name="dc.language" content="(SCHEME=ISO639-1) en"/>
    <meta name="projet" content="GRACE"/>
    <script type="text/javascript" src="https://raweb.inria.fr/rapportsactivite/RA2016/static/MathJax/MathJax.js?config=TeX-MML-AM_CHTML">
      <!--MathJax-->
    </script>
  </head>
  <body>
    <div class="tdmdiv">
      <div class="logo">
        <a href="http://www.inria.fr">
          <img style="align:bottom; border:none" src="../static/img/icons/logo_INRIA-coul.jpg" alt="Inria"/>
        </a>
      </div>
      <div class="TdmEntry">
        <div class="tdmentete">
          <a href="uid0.html">Project-Team Grace</a>
        </div>
        <span>
          <a href="uid1.html">Members</a>
        </span>
      </div>
      <div class="TdmEntry">Overall Objectives<ul><li><a href="./uid3.html">Scientific foundations</a></li></ul></div>
      <div class="TdmEntry">Research Program<ul><li><a href="uid5.html&#10;&#9;&#9;  ">Algorithmic Number Theory</a></li><li><a href="uid9.html&#10;&#9;&#9;  ">Arithmetic Geometry: Curves and
their Jacobians</a></li><li><a href="uid10.html&#10;&#9;&#9;  ">Curve-Based cryptology</a></li><li><a href="uid11.html&#10;&#9;&#9;  ">Algebraic Coding Theory</a></li></ul></div>
      <div class="TdmEntry">Application Domains<ul><li class="tdmActPage"><a href="uid13.html&#10;&#9;&#9;  ">Cryptography and Cryptanalysis</a></li></ul></div>
      <div class="TdmEntry">
        <a href="./uid18.html">Highlights of the Year</a>
      </div>
      <div class="TdmEntry">New Software and Platforms<ul><li><a href="uid24.html&#10;&#9;&#9;  ">ACTIS</a></li><li><a href="uid27.html&#10;&#9;&#9;  ">muKummer</a></li></ul></div>
      <div class="TdmEntry">New Results<ul><li><a href="uid33.html&#10;&#9;&#9;  ">Faster elliptic
and hyperelliptic curve cryptography</a></li><li><a href="uid34.html&#10;&#9;&#9;  ">Quantum factoring</a></li><li><a href="uid35.html&#10;&#9;&#9;  ">Advances in point counting</a></li><li><a href="uid36.html&#10;&#9;&#9;  ">Cryptanalysis of code based cryptosystems by filtration attacks</a></li><li><a href="uid39.html&#10;&#9;&#9;  ">Quantum LDPC codes</a></li><li><a href="uid40.html&#10;&#9;&#9;  ">Discrete Logarithm computations in
finite fields with the NFS algorithm</a></li><li><a href="uid46.html&#10;&#9;&#9;  ">Rank metric codes over infinite fields</a></li><li><a href="uid47.html&#10;&#9;&#9;  ">Hash function cryptanalysis</a></li><li><a href="uid50.html&#10;&#9;&#9;  ">Block cipher design and analysis</a></li><li><a href="uid52.html&#10;&#9;&#9;  ">Weight distribution of
Algebraic-Geometry codes</a></li><li><a href="uid53.html&#10;&#9;&#9;  ">Update on the Chor-Rivest cryptosystem</a></li><li><a href="uid54.html&#10;&#9;&#9;  ">Proofs or Retrievability</a></li><li><a href="uid55.html&#10;&#9;&#9;  ">Fast Encoding of Multiplicity Codes</a></li><li><a href="uid56.html&#10;&#9;&#9;  ">Private Information Retrieval</a></li><li><a href="uid57.html&#10;&#9;&#9;  ">Compact McEliece Keys from Algebraic-geometry codes</a></li></ul></div>
      <div class="TdmEntry">Bilateral Contracts and Grants with Industry<ul><li><a href="uid59.html&#10;&#9;&#9;  ">Bilateral Grants with Industry</a></li></ul></div>
      <div class="TdmEntry">Partnerships and Cooperations<ul><li><a href="uid61.html&#10;&#9;&#9;  ">Regional Initiatives</a></li><li><a href="uid65.html&#10;&#9;&#9;  ">National Initiatives</a></li><li><a href="uid68.html&#10;&#9;&#9;  ">European Initiatives</a></li></ul></div>
      <div class="TdmEntry">Dissemination<ul><li><a href="uid90.html&#10;&#9;&#9;  ">Promoting Scientific Activities</a></li><li><a href="uid143.html&#10;&#9;&#9;  ">Teaching - Supervision - Juries</a></li><li><a href="uid179.html&#10;&#9;&#9;  ">Popularization</a></li></ul></div>
      <div class="TdmEntry">
        <div>Bibliography</div>
      </div>
      <div class="TdmEntry">
        <ul>
          <li>
            <a id="tdmbibentmajor" href="bibliography.html">Major publications</a>
          </li>
          <li>
            <a id="tdmbibentyear" href="bibliography.html#year">Publications of the year</a>
          </li>
          <li>
            <a id="tdmbibentfoot" href="bibliography.html#References">References in notes</a>
          </li>
        </ul>
      </div>
    </div>
    <div id="main">
      <div class="mainentete">
        <div id="head_agauche">
          <small><a href="http://www.inria.fr">
	    
	    Inria
	  </a> | <a href="../index.html">
	    
	    Raweb 
	    2016</a> | <a href="http://www.inria.fr/en/teams/grace">Presentation of the Project-Team GRACE</a> | <a href="https://team.inria.fr/grace/">GRACE Web Site
	  </a></small>
        </div>
        <div id="head_adroite">
          <table class="qrcode">
            <tr>
              <td>
                <a href="grace.xml">
                  <img style="align:bottom; border:none" alt="XML" src="../static/img/icons/xml_motif.png"/>
                </a>
              </td>
              <td>
                <a href="grace.pdf">
                  <img style="align:bottom; border:none" alt="PDF" src="IMG/qrcode-grace-pdf.png"/>
                </a>
              </td>
              <td>
                <a href="../grace/grace.epub">
                  <img style="align:bottom; border:none" alt="e-pub" src="IMG/qrcode-grace-epub.png"/>
                </a>
              </td>
            </tr>
            <tr>
              <td/>
              <td>PDF
</td>
              <td>e-Pub
</td>
            </tr>
          </table>
        </div>
      </div>
      <!--FIN du corps du module-->
      <br/>
      <div class="bottomNavigation">
        <div class="tail_aucentre">
          <a href="./uid11.html" accesskey="P"><img style="align:bottom; border:none" alt="previous" src="../static/img/icons/previous_motif.jpg"/> Previous | </a>
          <a href="./uid0.html" accesskey="U"><img style="align:bottom; border:none" alt="up" src="../static/img/icons/up_motif.jpg"/>  Home</a>
          <a href="./uid18.html" accesskey="N"> | Next <img style="align:bottom; border:none" alt="next" src="../static/img/icons/next_motif.jpg"/></a>
        </div>
        <br/>
      </div>
      <div id="textepage">
        <!--DEBUT2 du corps du module-->
        <h2>Section: 
      Application Domains</h2>
        <h3 class="titre3">Cryptography and Cryptanalysis</h3>
        <p>In the twenty-first century, cryptography plays two essential roles:
it is used to ensure <i>security</i> and <i>integrity</i>
of communications and communicating entities.
Contemporary cryptographic techniques can be used
to hide private data,
and to prove that public data has not been modified;
to provide anonymity, and to assert and prove public identities.
The creation and testing of practical cryptosystems involves</p>
        <ol>
          <li>
            <p class="notaparagraph"><a name="uid14"> </a>The design of provably secure protocols;</p>
          </li>
          <li>
            <p class="notaparagraph"><a name="uid15"> </a>The design and analysis of compact and efficient
algorithms to implement those protocols, and to attack
their underlying mathematical and computational problems;</p>
          </li>
          <li>
            <p class="notaparagraph"><a name="uid16"> </a>The robust implementation of those algorithms in
low-level software and hardware, and their deployment in the
wild.</p>
          </li>
        </ol>
        <p>While these layers are interdependent, GRACE's cryptographic
research is focused heavily on the middle layer: we design, implement,
and analyze the most efficient algorithms for fundamental tasks in
contemporary cryptography. Our “clients”, in a sense, are
protocol designers on the one hand, and software and hardware engineers
on the other.</p>
        <p>F. Morain and B. Smith work primarily on
the number-theoretic algorithms that underpin the current
state-of-the-art in public-key cryptography (which is used to
establish secure connections, and create and verify digital
signatures, among other applications).
For example, their participation in the ANR CATREL project aims
to give a realistic assessment of the security of systems based
on the Discrete Logarithm Problem, by creating a free, open,
algorithmic package implementing the fastest known algorithms
for attacking DLP instances. This will have an extremely important
impact on contemporary pairing-based cryptosystems, as well as
legacy finite field-based cryptosystems.
On a more constructive note, F. Morain' elliptic curve point counting
and primality proving algorithms are essential tools in the everyday
construction of strong public-key cryptosystems,
while B. Smith's recent work on elliptic and genus 2 curves aims to improve the
speed of curve-based cryptosystems (such as Elliptic Curve Diffie–Hellman
key exchange, a crucial step in establishing secure internet
connections) without compromising their security.</p>
        <p>D. Augot, F. Levy-dit-Vehel, and A. Couvreur's
research on codes has far-reaching applications in
<i>code-based cryptography</i>.
This is a field which is growing rapidly in importance—partly
due to the supposed resistance of code-based cryptosystems to
attacks from quantum computing, partly due to the range of new
techniques on offer, and partly because the fundamental problem
of parameter selection is relatively poorly understood.
For example, A. Couvreur's work on filtration attacks on codes has an
important impact on the design of code-based systems using wild Goppa
codes or
algebraic geometry codes, and on the choice of parameter sizes
for secure implementations.</p>
        <p>Coding theory also has important practical applications in the
improvement of conventional symmetric cryptosystems. For example,
D. Augot's recent work on MDS matrices via BCH codes gives a more
efficient construction of optimal diffusion layers in block
ciphers. Here we use combinatorial, non-algorithmic properties of
codes, in the internals of designs of block ciphers.</p>
        <p>While coding theory brings tools as above for the classical
problems of encryption, authentication, and so on, it can also
provide solutions to new cryptographic problems. This is
classically illustrated by the use of Reed-Solomon codes in secret
sharing schemes. Grace is involved in the study, construction and
implementation of locally decodable codes, which have applications
in quite a few cryptographic protocols : <i>Private Information Retrieval</i>,
<i>Proofs of Retrievability</i>, <i>Proofs of Ownership</i>, etc.</p>
      </div>
      <!--FIN du corps du module-->
      <br/>
      <div class="bottomNavigation">
        <div class="tail_aucentre">
          <a href="./uid11.html" accesskey="P"><img style="align:bottom; border:none" alt="previous" src="../static/img/icons/previous_motif.jpg"/> Previous | </a>
          <a href="./uid0.html" accesskey="U"><img style="align:bottom; border:none" alt="up" src="../static/img/icons/up_motif.jpg"/>  Home</a>
          <a href="./uid18.html" accesskey="N"> | Next <img style="align:bottom; border:none" alt="next" src="../static/img/icons/next_motif.jpg"/></a>
        </div>
        <br/>
      </div>
    </div>
  </body>
</html>
