written by Poompong Chaiwongkhot, a PhD candidate at the Intstitute for Quantum Computing, University of Waterloo, Canada & QTFT.
edited by Dr. Thiparat Chotibut, Chulalongkorn University & QTFT.
Authors’ note: It is highly recommended for uninitiated readers on Cryptography to check out this article before continuing.
One of the major challenges multinational corporations and governments is facing is the assurance of secure data transmission across communication networks. In most cases, secure data transmission protocols require encryption of data or messages using a key, which is a secret bit string only known to the sender and the intended receivers. This key…
written by Rachata Tosirisuk, CAT Telecom & USC alumni
edited by Dr. Thiparat Chotibut, Chulalongkorn University & QTFT
If you have read Introduction to Modern Cryptography by Jonathan Katz, feel free to skip this article! The article and its sequels attempt to summarize the textbook to laypeople.
Cryptography has been with us for ages. The original formulation was not as complex as the modern one. Its original intention was very simple; to preserve the privacy of the message. …