lecture30: Cryptography and Information Theor
Topics covered
- \large{Private-Key Cryptography}
- \large{Public-Key Cryptography}
- Public-Key Cryptography Requirements and Assumptios
- \large{The RSA Cryptosystem}
- RSA
%
- \large{Why it works}
- \large{RSA Encryption}
%
- \large{RSA Deciphering}
%
- Unsolved problems
- Basic Framework
- \large{Computational Security}
- Example: RSA
- \large{Other Forms of Security}
- Assumptions on the Cryptosystem
- Example
- Example 2
- \large{Perfect Security Lemma}
- Perfect Security Lemma
- Perfect Security Theorem
- \large{The One-Time Pad}
\begin{frame}{Information-Theoretic interpretation of Information
- Other Examples
%
- Failures in Cryptograph
%
- Translating Hieroglyphs
%
- Translating Linear B