Date | Speaker | Title |
21.03.17 | Seda Kütük | Quantum Key Generation |
14.03.17 | Fatma Betül Varol | Bypassing Same Origin Policy(SOP) |
07.03.17 | Muzaffer Cem Tüver | Lambda Coordinates for Binary Elliptic Curves |
Speaker: Seda KÜTÜK
Date: March 21th, 2017
Time: 12:30-13:30
Location: UHEM Meeting Room
Title: Quantum Key Generation
Abstract
Quantum Key Generation combines cryptographic protocols and quantum mechanics. On the basis of “No-Cloning Theorem” quantum shows that quantum information cannot be copied.
And the second base theorem is “Heisenberg’s Uncertainity Principle” which tells us it is not possible to completely measure a quantum state. Among the cryptographic protocols we use BB84 protocol to control eavesdropping with respect to degree of photon polarization with qubits. This seminar will focus on secure key generation between sender & receiver via quantum channel which is more secure than the classical channel. The system also will detect if there is any attack by third party.
Speaker Info: Istanbul Technical University, Informatics Institute, Cybersecurity Engineering and Cryptography Master Student.
Speaker: Fatma Betül Varol
Date: March 14th, 2017
Time: 12:30-13:30
Location: UHEM Meeting Room
Title: Bypassing Same Origin Policy(SOP)
Abstract
The security model of existing web browsers is based on the same-origin policy, and provides some basic protection features to web applications in order to protect the users from most common security attacks. But, this feature has its own limitations. These limitations block many of the genuine functions for web applications. There are ways for applications to make exceptions to the same-origin policy.
This seminar will focus on the limitations enforced by the Same Origin Policy and how to overcome them without compromising the web security.
Speaker Info
Istanbul Technical University, Applied Informatics Department, Cybersecurity Engineering and Cryptography Master Student.
Speaker: Muzaffer Cem Tüver
Date: March 7th, 2017
Time: 12:30-13:30
Location: UHEM Meeting Room
Title: Lambda Coordinates for Binary Elliptic Curves
Abstract
Elliptic curve cryptography (ECC) is a public-key cryptography based on elliptic curves over finite fields and can be used for encryption, digital signature and random-number generation. According to researches ECC can provide the same level of security using smaller keys than traditional cryptosystems such as RSA. With the benefit of using smaller keys, ECC can deliver faster encryption on smaller hardware.
Lambda-coordinates is a new system for representing points on elliptic curves which is developed for reducing the cost of scalar multiplication to provide important speedups which enable even faster cryptography.
Speaker Info
Istanbul Technical University, Applied Informatics Department, Cybersecurity Engineering and Cryptography Master Student.