π€ many cryptographic scheme(κ³ν/μ λ/μ±
λ΅) have 'real world analogues'
e.g.) signature -> digital signitures
locks and keys -> public/private key
by case
μμ
ppt κ·Έλ₯ κ·Έλλ‘ μ μ½μΌλ©΄ λ (μ¬λ£μ€μ¬μ exampleλ€ λμ΄)
by period
Ancient period
transposition of letters substitution
- Greek Caesar shift cipher : replace latters
- Greeks letters into numbers
Technical Period
machine used for substitution
Modern Period
Most Mathmatical & Computational
- Shannon : "a mathmatical theory of cryptography"
- DES : data encryption standard (create a hidden cipher text from a plaintext bits through series of complicated operations)
- Diffie-Hellmen Key Exchange : asymmetric cryptography. very significant step.
Hello Future
- network security is increasingly becoming important
- many new security problems aries