Tuesday, October 2, 2012

3.6-3.7, due October 3

It would be very helpful to see examples involving Euler's formula, as well as a better explanation of the Three-Pass protocol.

Although I didn't understand it fully, the Three-Pass protocol is a neat solution to the problem of securely delivering a key to the recipient of an encoded message.  Since work in cryptography assumes Kerckhoff's principle, the security of any method is derived from the key, which means methods of public-key cryptography are very secure.

No comments:

Post a Comment