• Differential Cryptanalysis (Chapter 6)
• Linear Cryptanalysis (Chapter 7)
• Advanced Differential and Linear Attacks (Chapter 8)
– Differential-Linear Attacks
– Impossible Differentials
– Truncated Differentials
– Higher order attacks
– Boomerang attacks
• Brute Force Attacks (Chapter 5)
• Structural Attacks on AES
• Attacks on Stream Ciphers
– Correlation Attacks
– Fast Correlation Attacks
– Algebraic Attacks
• Additional Topics
Attacks against classic cryptosystems and chosen modern symmetric and asymmetric ciphers are treated in this course. Practical methods of searching for a weaknesses in given cryptosystem and exploitation of such weaknesses are emphasized.