2. History of Cryptography

YonaΒ·2021λ…„ 9μ›” 29일
0

πŸŒ™Β CS_security

λͺ©λ‘ 보기
4/24

πŸ€” many cryptographic scheme(κ³„νš/μ œλ„/μ±…λž΅) have 'real world analogues'
e.g.) signature -> digital signitures
locks and keys -> public/private key

by case

μˆ˜μ—… ppt κ·Έλƒ₯ κ·ΈλŒ€λ‘œ μ­‰ 읽으면 댐 (μ‚¬λ£Œμ€‘μ‹¬μ˜ exampleλ“€ λ‚˜μ—΄)

by period

Ancient period

transposition of letters substitution

  • Greek Caesar shift cipher : replace latters
  • Greeks letters into numbers

Technical Period

machine used for substitution

  • enigma

Modern Period

Most Mathmatical & Computational

  • Shannon : "a mathmatical theory of cryptography"
  • DES : data encryption standard (create a hidden cipher text from a plaintext bits through series of complicated operations)
  • Diffie-Hellmen Key Exchange : asymmetric cryptography. very significant step.

Hello Future

  • network security is increasingly becoming important
  • many new security problems aries
profile
Sometimes you win, sometimes you learn πŸƒβ€β™€οΈ

0개의 λŒ“κΈ€