Theorie Securite
Theorie Securite
RESG4: security
Introduction
Computer security is necessary to our society: it is being used in online voting system, online
tax forms or even online medical data.
After WW2, it was necessary to protect our computer systems. There are different types of
threats and protections. The main problem is that the stronger the security, the heavier it is.
That’s why we have to analyse each risk and their probability to occur.
The most common risks are:
Objectives
Many security systems rely on considerable amount of time to solve problems: number
factorisation, function inversion, combinatorial and statistical optimisation, etc.
[A REMPLIR AVEC LE RESTE QUAND LES DIAS SONT PUBLIEES]
1
RESG4 2019/2020
Algorithmic complexity
Efficiency
Resources available during execution are time and memory limited: algorithms have to be
efficient.
Security
It relies on complex mathematical problems:
Context
Libraries details algorithmic complexity (by using the worst case and asymptotic behaviour)
or talk about easy and hard problems. Example: “In the worst case, the number presents…”
or “It’s hard to compute a path in a graph”.
Detailed analysis
CF the example on dia 5/6.
Asymptotic behaviour
Counting elementary operations is boring: we’re interested in asymptotic behaviour, when n
is large.
Easy is when the complexity is bounded by a polynomial (polynomial above).