05.01.14 - 10.01.14, Seminar 14021

Symmetric Cryptography

Diese Seminarbeschreibung wurde vor dem Seminar auf unseren Webseiten veröffentlicht und bei der Einladung zum Seminar verwendet.


In recent years, the field of Symmetric Cryptography has greatly advanced.

The cryptanalysis of cryptographic hash functions made a quantum leap in 2004/2005, and in 2012, Keccak was selected as the winner of the SHA-3 competition. “Attacks” on AES (related-key attacks and biclique attacks) were found that tell it apart from an ideal cipher, but they also leave a question of when a mathematical observation on a symmetric primitive represents a real weakness and should be called an “attack”. The rapid development of lightweight cryptography yields a series of innovative designs of symmetric primitives, and these new designs also create opportunities for novel attacks. A new competition, CAESAR (Competition for Authenticated Encryption: Security, Applicability, and Robustness), has been launched, and is now calling for submissions of authenticated encryption schemes.

The aim of the seminar is to bring together leading experts and exceptionally talented junior researchers working in the field of Symmetric Cryptography. Most of the participants are expected to give presentations on their current research. The schedule will ensure ample time for discussions and ad hoc sessions without talks prepared in advance of the seminar. We plan to hold one or two “brainstorming” or “rump” sessions, to discuss unfinished ideas, to present very recent results (perhaps found during the course of the seminar), and to reflect the current state of symmetric cryptography in general. The seminar will concentrate on the design and analysis of

  • symmetric primitives (block and stream ciphers, message authentication codes, and hash functions), as well as
  • complex cryptosystems and cryptographic protocols based on symmetric primitives.

Further, at the discussions during the Dagstuhl Seminar on Symmetric Cryptography in 2012, participants agreed on authenticated encryption becoming a major research topic for Symmetric Cryptography in the next few years, because current authenticated encryption schemes are not always suitable for practical demand. The issues around authenticated encryption schemes will be one of the topics of the seminar.