Anthology of Encryption Davon Dunajski
In the Beginning Rudimentary Code One Time Pads Enigma Machine Tasks – Authentication – Integrity – Nonrepudiation
Modern Encryption Types Symmetric Key Asymmetric Key
The Encryption of Our Lives RSA – Public Key – Diffie Hellman Key Exchange – Phi Function – Euler’s Theorem – Problems
Public Key Sadie, Rob, Ilona and locks Benefits
Diffie Hellman Key Exchange Secretly Exchanging a Key One Way Function – Trapdoor OWF
Phi’s Function Largest Prime Number Prime Factorization Phi’s Function
Connecting Back Euler’s Theorem Sadie’s Private Key/Trapdoor
Issues Wireless Networks Generating Keys
When Does Encryption Fail Poor Implementation Human Error Unbreakable Mindset
Conclusion Encryption is based on mathematical concepts Until now, symmetric keys RSA People break the system Nothing is Unbreakable
Questions
The End