Prof. Shweta Agrawal, CSE | "Real-life cryptography is cooler than Imitation Game-the movie"| Ep.13

Prof. Shweta Agrawal, CSE | "Real-life cryptography is cooler than Imitation Game-the movie"| Ep.13

Best Place To BuildFeb 14, 20251h 5m

Shweta Agrawal (guest), Unknown Host (host)

Definition and goals of cryptography (secrecy, authentication)From Caesar cipher to provable modern cryptographyAttack models: eavesdroppers vs active attackersHard problems, efficiency, and polynomial timePublic-key encryption and RSAP vs NP and what “hardness” meansQuantum threat and post-quantum cryptographyComputing on encrypted data and multiparty computationFunctional encryption and authorized computationAttribute-based encryption and access controlLattice-based cryptography as rich new toolkitCyStar center: cybersecurity, outreach, and talent-buildingWomen in STEM pipeline and leadership biasReturning to India and “Atma Shraddha” mindsetArt, beauty, and the structure–randomness analogy

In this episode of Best Place To Build, featuring Shweta Agrawal and Unknown Host, Prof. Shweta Agrawal, CSE | "Real-life cryptography is cooler than Imitation Game-the movie"| Ep.13 explores modern cryptography, hard problems, encrypted computation, and building India’s research Cryptography is framed as the “art of keeping secrets,” enabling private communication, authentication, and secure protocols against algorithmic attackers.

Modern cryptography, hard problems, encrypted computation, and building India’s research

Cryptography is framed as the “art of keeping secrets,” enabling private communication, authentication, and secure protocols against algorithmic attackers.

Modern cryptography aims for mathematical, reduction-based security: breaking a scheme should be as hard as solving a well-studied hard problem.

Core ideas like efficient algorithms (polynomial time), hardness assumptions, and the P vs NP question are introduced as the conceptual basis for cryptographic security.

Agrawal’s research focus is computing on encrypted data via functional encryption and related primitives, with an emphasis on post-quantum (lattice-based) security.

The conversation broadens to computer science as “computing” (not just coding), India’s improving cryptography research ecosystem, the CyStar cybersecurity center at IIT Madras, and cultural issues like women’s retention in STEM and “Atma Shraddha” (self-belief).

Key Takeaways

Modern crypto security is about reductions to hard problems, not secrecy-by-obscurity.

Agrawal emphasizes that a secure scheme should be breakable only if an attacker can solve a specific, widely studied hard mathematical problem, giving stronger confidence than ad-hoc designs.

Get the full analysis with uListen AI

“Attackers” in cryptography are modeled as algorithms with capabilities.

An eavesdropper is a passive attacker who listens, while a stronger attacker may also modify messages; defining these models precisely is central to security claims.

Get the full analysis with uListen AI

Hardness means “no efficient probabilistic algorithm,” typically no polynomial-time solver.

In practice, “hard” is tuned to the application’s threat horizon (years to centuries), and security parameters are chosen so even massive classical compute can’t break it in reasonable time.

Get the full analysis with uListen AI

Public-key encryption shifts the burden to protecting a single secret key.

With RSA-style public/secret keys, anyone can encrypt using the public key, but only the holder of the secret key can decrypt—so operational security focuses on safeguarding the private key.

Get the full analysis with uListen AI

P vs NP underlies the possibility of cryptography, but specific assumptions drive real systems.

Cryptography requires some problems to be efficiently verifiable yet not efficiently solvable; while P vs NP is open, cryptographers rely on concrete conjectures backed by decades of analysis.

Get the full analysis with uListen AI

Quantum algorithms change what counts as “hard,” so post-quantum design is needed now.

Even before practical quantum machines exist, known algorithms (e. ...

Get the full analysis with uListen AI

Computing on encrypted data is possible only by balancing hidden structure with apparent randomness.

Ciphertexts must look like noise to attackers, yet contain enough algebraic structure to support authorized computations (add/multiply/ML-style processing) and correct decryption.

Get the full analysis with uListen AI

Functional encryption enables “authorized outputs” rather than revealing raw data.

Instead of decrypting everything, users receive keys that only reveal a permitted function of the ciphertexts—e. ...

Get the full analysis with uListen AI

Attribute-based encryption is functional encryption specialized to access control.

Decryption becomes conditional on attributes (e. ...

Get the full analysis with uListen AI

Lattice-based cryptography is not just a quantum fix—it enables new capabilities.

Agrawal highlights lattices as both a post-quantum candidate foundation and a “door of opportunity” whose rich structure supports cryptography beyond earlier number-theoretic tools.

Get the full analysis with uListen AI

Computer science is the science of computing, and programming is only one tool.

She distinguishes theory (complexity, cryptography), systems (OS, compilers, networks), and ML/AI, arguing that “CS = coding” is a misleading simplification.

Get the full analysis with uListen AI

India’s public-key cryptography research capacity has grown sharply in ~10 years.

She notes increased representation at top venues (e. ...

Get the full analysis with uListen AI

CyStar is designed to unify theory, bridging work, and applied security impact.

The center spans theoretical foundations, real-world models, and implementation/side-channel concerns, plus outreach (hackathons, winter schools) and talent development.

Get the full analysis with uListen AI

Women’s underrepresentation grows with seniority, despite strong academic performance.

She cites evidence of higher average CGPAs for women at IITs and discusses bias in perceived leadership (the “head of the table” experiment) as a barrier to advancement.

Get the full analysis with uListen AI

“Atma Shraddha” (self-belief) is presented as a strategic constraint on national progress.

Agrawal argues many students leave due to a default belief that excellence is “abroad,” urging informed choices based on objective fit rather than inherited inferiority narratives.

Get the full analysis with uListen AI

Notable Quotes

Calling our field computer science is like calling surgery knife science.

Shweta Agrawal

Cryptography, in a sentence, is the art of keeping secrets.

Shweta Agrawal

Modern cryptography seeks to... prove to you mathematically that the only way that you can break our code is by solving some very hard mathematical problem.

Shweta Agrawal

Real-life cryptography is cooler than this movie.

Shweta Agrawal

Cryptography is really this very fine dance between sort of structure and randomness.

Shweta Agrawal

Questions Answered in This Episode

When you say “prove security by reduction,” what does a reduction look like for a real scheme (step-by-step, conceptually)?

Cryptography is framed as the “art of keeping secrets,” enabling private communication, authentication, and secure protocols against algorithmic attackers.

Get the full analysis with uListen AI

In your view, what are the most common ways cryptosystems fail in practice despite strong theory (e.g., key handling, implementations, side channels)?

Modern cryptography aims for mathematical, reduction-based security: breaking a scheme should be as hard as solving a well-studied hard problem.

Get the full analysis with uListen AI

You described functional encryption keys that only open authorized computations—what prevents an analyst from combining multiple allowed functions to reconstruct the raw data?

Core ideas like efficient algorithms (polynomial time), hardness assumptions, and the P vs NP question are introduced as the conceptual basis for cryptographic security.

Get the full analysis with uListen AI

How does functional encryption differ from fully homomorphic encryption and secure multiparty computation in assumptions, efficiency, and deployment readiness?

Agrawal’s research focus is computing on encrypted data via functional encryption and related primitives, with an emphasis on post-quantum (lattice-based) security.

Get the full analysis with uListen AI

You mentioned RSA is easy for quantum computers—what are the concrete migration paths organizations should follow today (hybrid modes, timelines, standards)?

The conversation broadens to computer science as “computing” (not just coding), India’s improving cryptography research ecosystem, the CyStar cybersecurity center at IIT Madras, and cultural issues like women’s retention in STEM and “Atma Shraddha” (self-belief).

Get the full analysis with uListen AI

Transcript Preview

Shweta Agrawal

Calling our field computer science is like calling surgery knife science. Cryptography, in a sentence, is the art of keeping secrets. The desire to keep secrets is as old as humanity itself. Cryptography is really this very fine dance between sort of structure and randomness. I remember reading this algorithm as an undergrad and feeling that this is a life-changing moment. [upbeat music]

Unknown Host

Hi, my name is Amrit. We've heard that IIT Madras is the best place to build. [upbeat music] So we've come down to the Sudha and Shankar Innovation Hub. We want to meet some people. These are builders. We want to talk to them about their work, and also ask them, what makes IIT Madras the best place to build? [upbeat music] Hi, welcome to the Best Place to Build Podcast. Today, we are sitting with Professor Shweta Agrawal. She's a professor of computer science at IIT Madras. Her area of interest is cryptography, so I've brought my ruled notebook to take notes. Uh, she holds the Venky Hariharan and Anand Rajaram Chair, and has won numerous awards, including the Swarnajayanti in 2020. Welcome, ma'am.

Shweta Agrawal

Thank you so much. It's good to be here.

Unknown Host

Ma'am, let's start with, uh, what is cryptography? I think, uh, maybe it's obvious in your world, but it's completely alien to me.

Shweta Agrawal

So cryptography, in a sentence, is the art of keeping secrets. Uh, essentially, there are different goals that you might have, uh, such as, you know, wanting to communicate with someone in private, or when you're talking to someone, you, you may want to convince them that, you know, you are the person that they think, uh, they are talking to. So there are different goals that, uh, you might want to achieve in a secret manner, right? And cryptography is the science of enabling that.

Unknown Host

So what I know of this, from whatever you said, is, uh... So I've watched Imitation Game, which is a movie about, uh-

Shweta Agrawal

Yeah

Unknown Host

... about Alan Turing-

Shweta Agrawal

Right

Unknown Host

... his team breaking the Enigma code. So c- can you tell us where we started from in cryptography and where we have come to?

Shweta Agrawal

Yeah, so cryptography, uh, is really an ancient field, though it may not have been, you know, uh, given, given this name until much more recently. But it's, uh... You know, the, the desire to keep secrets is as, uh, old as humanity itself, right? So y- you have, like, these very, very old codes, like the Caesar cipher and so on, where essentially if I want to say something in private to you, I replace each letter by, you know, the letter five steps ahead of it or something like that. So, uh, the field in, in its original form, I think has always existed, as long as humanity has existed. Uh, the movie you mentioned, and I mean, uh, the, the war and the efforts of building, uh, unbreakable codes, of course, took on, uh, like, a profound importance, uh, during that time. And, uh, the field as we know it is actually also, in a way, inspired from what happened, uh, during the war, which is that, uh, you know, a, a bunch of really smart people put together a really, uh, hard code to break, what they thought was a hard code to break, but they missed something, right? And that's what led to the, the break of the code. So modern cryptography seeks to kind of address this problem by saying that, "You know, we will prove to you mathematically that the only way that you can break our code is by solving some, you know, very hard mathematical problem." So in some sense, you know, all attack vectors can be reduced down to, like, this one question of: Can you solve so and so problem? And then if you choose this underlying problem as something that, you know, maybe mathematicians have tried for, like, decades, uh, and you have a lot of confidence that this problem is going to be very hard for any attacker, then you can have much more confidence that your code is secure.

Install uListen to search the full transcript and get AI-powered insights

Get Full Transcript

Get more from every podcast

AI summaries, searchable transcripts, and fact-checking. Free forever.

Add to Chrome