I gave a talk about Whitfield Diffie & Martin Hellman’s (1976) “New Directions In Cryptography” paper at Papers We Love Singapore where they announced the Diffie-Hellman Key Exchange.
one else can read my messages except my intended recipient - No one else can inject messages messages to my intended recipients • Authentication - Recipients knows that only sender could have sent this message Most modern standards give both, auth-only standards exists too
texts at once Small change in input produces major changes in output This error prorogation is useful: e.g. hash functions Common block cipher: AES-256bit This paper mainly deals with block ciphers AES HELLO YXTE
brute forced 128 bits -> 128 0s & 1s 2^128 possibilities -> 340 billion billion billion billion If you could test 1 billion keys a second -> 5 * 10^21 years
public key cryptography could be done 2 years later, RSA was released Asymmetric Ciphers - Prime Numbers • Generate a key pair • One key to encrypt, pair key to decrypt