4. Agenda
● Modern life and confidential information
● Understanding cryptography
● First methods ( and the key distribution problem )
● Actual methods ( public-key distribution )
● Conclusion
12. Purpose
"Always be yourself, express
yourself, have faith in yourself, do
not go out and look for a successful
personality and duplicate it."
Bruce Lee.
ylGgbjwpVnrN4Mx4kTDG4LD8blwtFU
G2X7MQt5olmuWRw7HPIY6/U8Fplmz
EdVWWX+/0ivQ5pRMjUzhSmxXuZG09
HqLiWWrV7Fr4pCG7bTeEEq0LDr0Lze
/rYgLy1faxhYZb9M0ADol1XmaFS5iTK
gjv/PWTQbV8v7eTBaxKL/xQUvAUjQ
b1ZeZWd7pyzhf8
ORIGINAL CIPHERED
26. Prime number (617 digits)
251959084756578934940271832400483985714292821262040320277771378360436620
207075955562640185258807844069182906412495150821892985591491761845028084
891200728449926873928072877767359714183472702618963750149718246911650776
133798590957000973304597488084284017974291006424586918171951187461215151
726546322822168699875491824224336372590851418654620435767984233871847744
479207399342365848238242811981638150106748104516603773060562016196762561
338441436038339044149526344321901146575444541784240209246165157233507787
077498171257724679629263863563732899121548314381678998850404453640235273
81951378636564391212010397122822120720357
27. Why is that safe?
1.There are infinite prime numbers
2.There is no general mathematical formula
to get ALL prime numbers
3.There is no efficient algorithm to factorize
numbers
36. Bibliography
Baar, T. H. (2002). Invitation to Cryptology. New Jersey: Prentice Hall.
Kippenhahn, R. (1999). Code Breaking: A history and exploration . New York: Overlook Press.
Singh, S. (2001). The Code Book: How to Make It, Break It, Hack It, Crack It.
New York: Delacorte Press.