Saturday with Math (Sep 14th)

Saturday with Math (Sep 14th)

In this edition of Saturday with Math, we’re diving into the secretive world of cryptography—because who doesn’t love a little math with their espionage? Picture this: you're deep in the Cold War, encrypted messages flying faster than James Bond's Aston Martin. Cryptography has been the undercover hero of history, from ancient Egyptian hieroglyphs to the code-breaking triumphs of WWII.

Remember that moment when Ethan Hunt effortlessly hacks through a security system? Well, you can thank the masterminds behind frequency hopping and public-key cryptography—because they turned "mission impossible" into "mission encrypted and secure." But cryptography isn’t just for action movies. It’s been around since Julius Caesar was sending secret love notes (or, more likely, battle plans). Fast forward to WWII, and the real-world code-cracking superstars, like Alan Turing, were busy saving the day by decoding the Enigma machine and changing the course of history.

And let’s not forget Hedy Lamarr—yes, the glamorous Hollywood star who invented technology that became the foundation for Wi-Fi and Bluetooth. Her frequency-hopping invention is cooler than any spy gadget Q ever dreamed up. Now, with quantum cryptography on the horizon, even the most devious villain with a quantum computer won’t be able to crack the code.

So next time you're watching a spy movie, remember: the real magic isn't just in the gadgets or slick moves. It's in the math that’s been keeping secrets safe for centuries—and that’s one formula you definitely want on your side.

?

Brief History [1]

Cryptography, derived from the Greek words for "hidden writing," is the practice of encrypting information so that only the intended recipient can interpret it. Throughout history, cryptography has been a crucial tool for securing communication, from ancient civilizations to modern digital systems. Today, it is a cornerstone of cybersecurity, protecting everything from personal messages and online transactions to government secrets.

The roots of cryptography can be traced back thousands of years. One of the earliest known examples dates to 1900 BC in Egypt, where non-standard hieroglyphs were used on tomb walls. By 650 BC, the Spartans employed a transposition cipher called the scytale to encode military messages, using leather strips and wooden staffs. Julius Caesar also contributed to cryptography with the Caesar Cipher, a substitution cipher that shifted letters in the alphabet to scramble messages.

In the medieval period, cryptography advanced significantly with the invention of frequency analysis by the Arab mathematician Al-Kindi around 800 AD. This technique, which analyzed the frequency of letters in a cipher to break the code, revolutionized cryptanalysis. Later, in the 16th century, Giovan Battista Bellaso introduced the Vigenère Cipher, which used multiple alphabets for encryption, adding complexity and security to the process.

Cryptography saw dramatic advancements in the 20th century, especially during times of war. The Hebern Rotor Machine and the more advanced Enigma Machine were used during World War I and II to encode messages. The Enigma Machine, used extensively by Germany in WWII, played a crucial role in German military communications but was eventually cracked by Allied codebreakers, including British mathematician Alan Turing. Turing's contributions laid the foundation for modern computational cryptography and are credited with shortening the war by up to two years.

Around the same time, Hedy Lamarr, [11] a Hollywood actress and inventor, contributed to cryptographic technology by co-inventing a frequency-hopping system to prevent radio signal jamming, a precursor to modern wireless communication technologies like Wi-Fi and Bluetooth. Though her invention was not utilized during the war, it became a key innovation in telecommunications.


Secret Communication System - Hedy Lamarr’s patent

In 1976, a revolutionary development in cryptography occurred with the introduction of the Diffie-Hellman key exchange, which allowed two parties to securely share encryption keys without needing to meet in person. This marked the advent of public-key cryptography, a system where a public key is used for encryption and a private key for decryption. This was followed by the RSA algorithm in 1977, which remains a widely used method for secure data transmission. In 2001, the Advanced Encryption Standard (AES) replaced the Data Encryption Standard (DES), offering stronger encryption with longer key lengths suitable for modern computational capabilities.

Cryptography has not evolved in isolation; cryptanalysis, or the science of breaking codes, has developed in parallel. Al-Kindi’s frequency analysis technique was one of the earliest breakthroughs, while the breaking of the Zimmermann Telegram during World War I and the cracking of the Enigma code during World War II had profound impacts on history.

Until the 1960s, cryptography was largely the domain of governments, but two key events brought it into the public sphere: the creation of DES, a public encryption standard, and the invention of public-key cryptography. DES, created by IBM and adopted by the US government, was the first widely accepted public encryption standard. The introduction of public-key cryptography fundamentally changed the way encryption worked, enabling secure communication without needing a shared secret key.

As computing power continues to grow, cryptography has evolved to defend against new threats. Quantum cryptography, based on quantum mechanics, promises to create unbreakable encryption, while post-quantum cryptography is being developed to protect against potential quantum computer attacks, which could break existing cryptographic systems. These advancements aim to maintain the security of encrypted communications in an increasingly digital and interconnected world.

Cryptography, both in its classical and modern forms, remains a fundamental tool in securing digital information and communication, safeguarding privacy, and ensuring secure exchanges across various fields.

In today's interconnected world, cryptography is more important than ever. It underpins data protection, ensuring sensitive information such as personal data, financial transactions, and corporate communications remain confidential. Cryptography also plays a key role in protecting intellectual property, enabling businesses and creators to safeguard their assets from unauthorized access or theft. Furthermore, the rise of cryptocurrencies like Bitcoin relies on cryptographic principles to secure transactions and verify ownership, while smart contracts—self-executing contracts on blockchain platforms—use cryptography to ensure transparency and security in automated agreements.

On the geopolitical stage, cryptography is critical for national security, protecting government secrets and securing military communications, which can have far-reaching consequences in diplomacy and warfare. Its influence extends into modern economic infrastructure, e-commerce, and even how information is exchanged in global markets. Cryptography is no longer just a tool for privacy—it is a cornerstone of modern society, essential for protecting individuals, businesses, and nations in an era where data and digital interactions are the foundation of the global economy.

Number Theory-Based Cryptography [2]

Number theory-based cryptography is a critical foundation of modern encryption systems, relying on the deep mathematical properties of integers, primes, and modular arithmetic. Central to this field is the idea that certain mathematical problems, particularly those involving prime numbers, are computationally difficult to solve. These problems, such as factoring large numbers or solving discrete logarithms, form the basis for secure encryption schemes.

Number theory, one of the oldest branches of mathematics, focuses on the study of integers and their properties, including primes, divisibility, and arithmetic functions. Often called the "queen of mathematics" by Carl Friedrich Gauss, number theory has profound implications for both theoretical and applied mathematics. The roots of number theory trace back to ancient civilizations, where the Babylonians studied Pythagorean triples, and the Greeks, particularly Euclid, explored concepts like prime numbers and the Euclidean algorithm for finding the greatest common divisor.

The field saw significant advancements with Diophantus, who worked on equations now called Diophantine equations, and later with mathematicians like Fermat, Euler, and Gauss. Fermat introduced foundational concepts like Fermat’s Little Theorem, and Euler made strides in understanding sums of squares and continued fractions. Gauss, in his Disquisitiones Arithmeticae, developed the theory of quadratic forms and proved the law of quadratic reciprocity, solidifying number theory as a distinct mathematical discipline.

In the 19th and 20th centuries, analytic and algebraic number theory emerged. Riemann's work on the zeta function connected prime numbers to complex analysis, while algebraic number theory focused on the structure of number fields.

Number theory, a branch of mathematics dealing with the properties and relationships of numbers, plays a critical role in modern cryptography. This field's ability to handle complex operations like prime factorization and modular arithmetic underpins many cryptographic protocols. Among the early examples of number theory applied to cryptography is the Merkle-Hellman Knapsack Cryptosystem, which utilizes concepts such as superincreasing sequences and modular arithmetic.

The Merkle-Hellman Knapsack Cryptosystem, introduced in 1978, is an asymmetric cryptosystem that relies on the mathematical difficulty of the general knapsack problem. It operates by creating a public and private key pair using a special kind of sequence, known as a superincreasing sequence. This sequence has the property that each number in the sequence is greater than the sum of all previous numbers, making the subset sum problem easy to solve for those with the correct information. This superincreasing sequence forms part of the private key, while a transformed version of this sequence, using modular arithmetic, is made public.

The encryption process in this system involves breaking the message into binary bits, then selecting corresponding elements from the public key and summing them to create the ciphertext. The decryption, performed by someone who holds the private key, involves reversing this process by solving the subset sum problem using the superincreasing sequence.

Though once seen as a promising system, the Merkle-Hellman Knapsack Cryptosystem was eventually compromised by more advanced cryptanalysis techniques. Despite this, it was a foundational development in number theory-based cryptography and laid the groundwork for future cryptographic methods. It also highlighted the potential for number theory to address security challenges, particularly in public-key cryptography.

Today, number theory continues to play a key role in cryptographic systems, particularly in areas such as encryption, digital signatures, and secure communication. The Merkle-Hellman Knapsack Cryptosystem remains an important milestone in the history of cryptography, illustrating how mathematical complexity can be harnessed to protect sensitive information.

Group Theory-Based Cryptography [3,9]

Group theory, a core area of abstract algebra, studies algebraic structures called groups, which are central to understanding symmetry and structure in mathematics. A group consists of a set equipped with an operation that satisfies four properties: closure, associativity, identity, and invertibility. Originally developed through the work of mathematicians like évariste Galois in the 19th century, group theory has since evolved into a fundamental mathematical tool. It finds applications in numerous fields, from algebra and number theory to geometry and physics. For instance, in physics, groups help model symmetries in physical systems such as crystals and the hydrogen atom, while in chemistry, they explain molecular structures and reactions. The theory also plays a pivotal role in cryptography, particularly in encryption algorithms like RSA and elliptic curve cryptography, where the security of these systems relies on complex group-related problems, such as the difficulty of factoring large numbers or solving discrete logarithms. Beyond these, group theory influences fields like topology, where algebraic structures describe the properties of spaces, and in combinatorics, simplifying problems involving counting symmetries.

?

Examples of Group Theory-Based Cryptography

Group theory-based cryptography leverages the mathematical structure of groups to create secure cryptographic systems, utilizing the principles of abstract algebra. Cryptography built on group theory typically focuses on problems involving operations within finite groups, such as finding solutions for discrete logarithms or factoring large numbers, both of which are computationally difficult tasks. This difficulty forms the basis of cryptographic security.

Group theory, a branch of abstract algebra, forms the basis for many cryptographic systems used today. A group is a mathematical structure consisting of a set of elements and an operation that combines two elements to produce a third, while following properties such as closure, associativity, the existence of an identity element, and invertibility. These characteristics, along with the inherent complexity of group operations, offer a solid foundation for cryptographic systems that ensure secure communication by leveraging difficult-to-solve mathematical problems within groups.

A key example of group-theory-based cryptography is the discrete logarithm problem (DLP). In a cyclic group, the DLP involves finding an exponent (or logarithm) of a number, which is computationally easy in one direction but very difficult to reverse without specific private information. The Diffie-Hellman key exchange, which enables two parties to securely share a secret over an insecure communication channel, is based on this problem. The security of this method depends on the difficulty of solving the DLP, making it resistant to eavesdropping.

Elliptic curve cryptography (ECC) is another application of group theory in cryptography. ECC operates on the group of points on an elliptic curve, where the elliptic curve discrete logarithm problem (ECDLP) presents an even more challenging problem to solve compared to the traditional DLP. This increased complexity allows ECC to provide equivalent security with much smaller key sizes, making it ideal for use in devices with limited computational power, such as mobile phones and smart cards. The Elliptic Curve Diffie-Hellman (ECDH) algorithm is an example of how ECC enhances secure key exchanges while remaining highly efficient.

Group theory is also employed in public key cryptography, including systems like RSA, which, although rooted in number theory, relies on the multiplicative group of integers under modular arithmetic. Non-abelian groups are another area where group theory enhances cryptography. In systems such as braid group cryptography and those based on the conjugacy search problem, the complexity of reversing operations within certain non-commutative groups makes solving equations nearly impossible without the secret key.

Group-theory-based cryptography is essential to securing modern communication systems. From traditional algorithms like Diffie-Hellman to more advanced elliptic curve cryptography, group theory provides a powerful toolset for creating robust, secure cryptographic solutions that rely on the difficulty of solving group-theoretic problems. This versatility and security are key to ensuring the protection of sensitive information in our increasingly digital world.

?Algebraic Cryptography [4,10]

Algebraic cryptography relies on the complexity of mathematical structures from areas like lattices, multivariate polynomials, and error-correcting codes to design secure cryptographic systems. These cryptographic algorithms are grounded in problems that are computationally difficult to solve, ensuring security against attacks from both classical and quantum computers. A key example is lattice-based cryptography, which uses the geometry of lattices—regularly spaced arrays of points in n-dimensional space. Problems like finding the shortest or closest vector in a lattice are central to its security. Algorithms like NTRUEncrypt and Learning With Errors (LWE) exploit these difficult problems, with LWE particularly involving solving linear equations with added small errors, a problem that becomes intractable in high dimensions.

Multivariate quadratic cryptography is based on solving systems of quadratic equations over finite fields. These systems are hard to solve, and this difficulty forms the basis of secure schemes. For example, the cryptographic strength comes from the NP-completeness of solving such systems, making them resistant to efficient attacks. These techniques are used in cryptographic protocols such as HFE and Rainbow, particularly in signature schemes, where the challenge is to obscure the system of equations in a way that makes it easy for the keyholder to solve but difficult for attackers.


Examples of Algebraic Cryptography

Code-based cryptography, such as the McEliece cryptosystem, builds on error-correcting codes and the difficulty of decoding randomly generated linear codes. The mathematical foundation lies in coding theory, which is concerned with constructing codes that can detect and correct errors in transmitted data. The security of the McEliece system comes from the computational difficulty of decoding without knowledge of the specific code structure, a task that is resistant to both classical and quantum attacks. These approaches offer highly secure cryptographic systems with strong foundations in algebraic theory.

Hash Function-Based Cryptography [5]

Hash function-based cryptography is rooted in creating secure and collision-resistant hash functions that are computationally difficult to reverse. The fundamental idea is to make it extremely hard to find two different inputs that produce the same output, ensuring the integrity of data. One of the core techniques used in these functions is modular arithmetic, which helps keep values within a fixed range, ensuring consistent output sizes no matter how large the input. This mathematical tool allows the hash function to process long inputs and produce short, fixed-length outputs, a crucial feature for efficiency and practicality.

Bitwise operations, such as AND, OR, and XOR, are commonly used to manipulate data at the binary level, making it difficult to reverse the process and uncover the original input. These operations spread bits in the input across the output, contributing to the overall confusion and diffusion properties of the hash function. Rotating bits and performing other non-linear transformations further complicates any attempt to predict or reverse-engineer the hash output, enhancing the security of the function.


Merkle-Damg?rd construction

The Merkle-Damg?rd construction is a widely used method that allows hash functions to process variable-length inputs and produce a consistent, fixed-length output. This construction processes data in blocks and compresses them step-by-step, ensuring that even small changes in the input lead to significantly different hash values. This principle supports the avalanche effect, where a slight alteration in input drastically changes the output, making it almost impossible to predict how the input affects the final hash.

Hash functions also rely on modular additions and bitwise rotations to thoroughly mix the input data. These operations are key to ensuring that even the smallest changes in input result in vastly different outputs. The combination of these mathematical principles and operations creates a robust system that is fundamental to modern cryptography, protecting everything from digital signatures to blockchain integrity. Through the careful design of these functions, cryptographic systems ensure that data remains secure, difficult to alter, and easy to verify.

?

Symmetric Key Cryptography [6]

Symmetric key cryptography is based on several key mathematical principles, especially when dealing with finite fields, matrix operations, and non-linear transformations. The structure of finite fields, particularly GF(2^8), plays a central role, as seen in algorithms like AES (Advanced Encryption Standard). In AES, the Rijndael S-box, a non-linear transformation, is applied, and it is based on an inversion operation in GF(2^8). Finite field arithmetic ensures that operations like addition and multiplication are closed and well-defined over a finite number of elements. This is combined with linear algebra techniques, including matrix multiplication, to mix the data in each round of encryption.

In block ciphers such as AES, linear transformations (through matrix multiplication in GF(2^8)) and non-linear transformations (via the S-box) work together to ensure confusion and diffusion, which are essential for security. Finite field arithmetic is key here, as it ensures that operations such as addition, multiplication, and inversion are efficiently performed over the binary field GF(2^8), which fits the byte-oriented operations common in symmetric encryption.

In block ciphers like DES (Data Encryption Standard), the core idea is based on permutation and substitution, organized through the Feistel network. In a Feistel network, data is split into two halves, and rounds of permutations (rearranging the bits) and substitutions (replacing bits using S-boxes) are performed. Bitwise operations such as XOR are crucial, as they provide the necessary diffusion by mixing bits across different rounds. The Feistel structure allows for the same operations to be applied for encryption and decryption, which is a key advantage in terms of efficiency and implementation.


Examples of Symmetric Key Cryptography

In algorithms like Blowfish, the Feistel network structure is combined with a complex key scheduling process. Blowfish relies heavily on S-boxes for substitution and performs permutations to rearrange the bits. The non-linear S-box transformations are essential for adding complexity to the cipher, making it resistant to linear and differential cryptanalysis. XOR operations between the data and the round keys add diffusion at each step.

For stream ciphers such as those using the ARX (Addition, Rotation, XOR) structure, the mathematical foundation revolves around modular arithmetic. Modular addition ensures that values wrap around within a fixed range, typically the word size, while rotations cyclically shift the bits to increase diffusion. XOR operations are used to mix the data in a way that is reversible, making it suitable for encryption and decryption in symmetric key systems.

Thus, symmetric key cryptography combines linear algebra, finite field arithmetic, bitwise operations, and modular arithmetic to create secure and efficient encryption algorithms. Each of these mathematical fields contributes to the cipher’s ability to obscure the relationship between the key and the ciphertext, ensuring that the encryption is both secure and computationally feasible.

Quantum-Resistant Cryptography [7]

Quantum-resistant cryptography aims to develop encryption methods that are secure against potential attacks by quantum computers. These methods rely on mathematical problems that are believed to be hard to solve, even with the advanced computational power of quantum computers. The following are key mathematical principles and related topics used in quantum-resistant cryptography:

The security of lattice-based cryptography depends on the difficulty of solving lattice problems in high-dimensional spaces. Lattices are regular, grid-like structures in multi-dimensional spaces, and common problems include finding the shortest vector in a lattice or solving the closest vector problem, both of which are computationally difficult as dimensions increase. The mathematical foundation of these algorithms involves concepts from lattice theory, such as basis reduction, and linear algebra, including matrix operations and vector spaces. Modular arithmetic plays a key role in representing these lattices and performing computations efficiently, often involving modulo reductions to ensure finite field operations.

?

Examples of Quantum-Resistant Cryptography

In cryptography based on hash functions, security relies on the collision resistance of the hash functions, meaning that it is computationally infeasible to find two different inputs that result in the same hash value. The hash functions operate using binary trees and rely on properties like the one-time pad for encryption. Secure hash functions use bitwise operations, modular arithmetic, and permutations to generate unique fixed-size outputs from arbitrary-length inputs, ensuring that small changes in the input result in completely different outputs, known as the avalanche effect.

Code-based cryptography, such as the McEliece cryptosystem, relies on the difficulty of decoding random linear error-correcting codes. Specifically, Goppa codes, a type of algebraic geometry code, are used in these cryptosystems. The underlying math is rooted in coding theory, which deals with constructing codes that can detect and correct errors in data transmission. Linear algebra is heavily used here, particularly in the construction and manipulation of generator matrices, syndrome decoding, and the computation of codewords within large linear spaces.

These mathematical foundations ensure the cryptographic schemes are resistant to the computational advances expected from quantum computing, making them integral to the future of secure communication.

?Post-Quantum Cryptography [8]

Post-Quantum Cryptography relies on mathematical structures that are resistant to attacks from quantum computers, and much of its strength comes from problems in lattice theory and elliptic curves. In lattice-based cryptography, a lattice is essentially a grid of points in high-dimensional space, formed by linear combinations of vectors. These grids are the foundation of problems like the Shortest Vector Problem or Learning With Errors, which are challenging to solve, even with quantum computing power. Lattice-based cryptographic schemes often operate within the framework of ring theory, where certain algebraic structures allow for more efficient mathematical operations. Rings are used to define lattices in a way that integrates modular arithmetic, which ensures that calculations remain feasible for practical use while maintaining high levels of security. Modular arithmetic, which involves performing operations within a set range of values, ensures that cryptographic systems can handle large inputs securely and efficiently. In these systems, the difficulty of solving high-dimensional lattice problems underpins the security of encryption.

Examples of Post-Quantum Cryptography

In another branch of post-quantum cryptography, the focus shifts to elliptic curves and the mathematical relationships between them, known as isogenies. An elliptic curve is a smooth, curved geometric shape defined by a specific algebraic equation. The security of isogeny-based cryptography comes from the complexity of finding connections, or isogenies, between two given elliptic curves, a task that becomes exponentially harder as the size of the curves grows. Even though calculating these isogenies is straightforward when all the information is known, determining them from scratch without prior knowledge is extremely difficult. This forms the basis of secure communication systems, as it would be computationally infeasible for an attacker to reverse-engineer the isogeny between two curves. The study of elliptic curves and their isogenies falls within the field of algebraic geometry, which provides the tools to analyze these complex structures and to design cryptographic systems around them. The combination of these mathematical principles ensures that post-quantum cryptographic methods remain secure against the potential future threat posed by quantum computing technologies.

Equation in Focus

The equation in focus represents the cryptographic key that both parties can use in the Diffie-Hellman algorithm. The Diffie-Hellman key exchange is a mathematical method that allows two parties to securely generate a symmetric cryptographic key over a public channel. It was one of the first public-key protocols, conceived by Ralph Merkle and later named after Whitfield Diffie and Martin Hellman, who published their work in 1976. This groundbreaking method introduced the idea of a private key paired with a corresponding public key.

Traditionally, secure communication required physically exchanging keys, but Diffie-Hellman allows two parties with no prior connection to establish a shared secret key over an insecure channel. This key is then used for encrypting further communications with symmetric-key algorithms.

The method is widely used to secure internet services, although research from 2015 revealed that some parameters used in Diffie-Hellman were not strong enough to prevent attacks by well-funded adversaries. While the Diffie-Hellman key exchange is not inherently an authenticated protocol, it serves as the foundation for various authenticated protocols and is often used to provide forward secrecy in modern encryption protocols like Transport Layer Security (TLS).

Lamarr [12]

Hedy Lamarr (1914–2000) was an Austrian-born American actress who made a significant contribution to telecommunications through her co-invention of a radio guidance system during World War II. Alongside composer George Antheil, she developed a frequency-hopping spread spectrum technology designed to prevent the jamming of Allied torpedoes. Though the invention was not utilized during the war, its principles became essential for modern wireless communication technologies, including Wi-Fi, Bluetooth, and GPS. In recognition of her contribution, Lamarr was posthumously inducted into the National Inventors Hall of Fame in 2014.

Diffie [13]

Bailey Whitfield "Whit" Diffie, born in 1944, is a pioneering cryptographer who, along with Martin Hellman and Ralph Merkle, developed public-key cryptography. Their 1976 paper introduced the Diffie–Hellman key exchange, solving the key distribution problem in cryptography. This breakthrough paved the way for modern encryption algorithms. Diffie later worked at Sun Microsystems and served as Vice President for Information Security at ICANN. His contributions have had a lasting impact on both cryptographic technology and public access to secure communication.

Hellman [14]

Martin Hellman, born in 1945, is an American cryptologist and mathematician, best known for co-inventing public-key cryptography with Whitfield Diffie and Ralph Merkle. His work on the Diffie-Hellman key exchange revolutionized secure communication by enabling the secure exchange of cryptographic keys. Hellman has been an active advocate for computer privacy and has applied risk analysis to global security, particularly nuclear deterrence. He has received numerous prestigious awards, including the 2015 Turing Award for his contributions to modern cryptography.

References

[1] The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography"

[2] An Introduction to Mathematical Cryptography by Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman.

[3] Abstract Algebra: Theory and Applications by Thomas W. Judson.

[4] Algebraic Methods in Cryptography by Igor Shparlinski.

[5] Cryptography and Network Security: Principles and Practice by William Stallings.

[6] The Design of Rijndael: AES - The Advanced Encryption Standard by Joan Daemen and Vincent Rijmen.

[7] Post-Quantum Cryptography by Daniel J. Bernstein, Johannes Buchmann, and Erik Dahmen.

[8] Introduction to Modern Cryptography by Jonathan Katz and Yehuda Lindell.

[9] https://www.dhirubhai.net/pulse/saturday-math-june-1st-alberto-boaventura-nc6vf

[10] https://www.dhirubhai.net/pulse/saturday-math-aug-17th-alberto-boaventura-3xi9f

[11] Bombshell: The Hedy Lamarr Story

[12] https://en.wikipedia.org/wiki/Hedy_Lamarr

[13] https://en.wikipedia.org/wiki/Whitfield_Diffie

[14] https://en.wikipedia.org/wiki/Martin_Hellman

?

Keywords: #saturdaywithmath; #cryptography; #RSA; #AES; #ECC; #diffiehellman; ?#PostQuantumCryptography

?

?

要查看或添加评论,请登录

社区洞察

其他会员也浏览了