written by Poompong Chaiwongkhot, a PhD candidate at the Intstitute for Quantum Computing, University of Waterloo, Canada & QTFT.
edited by Dr. Thiparat Chotibut, Chulalongkorn University & QTFT.
Authors’ note: It is highly recommended for uninitiated readers on Cryptography to check out this article before continuing.
One of the major challenges multinational corporations and governments is facing is the assurance of secure data transmission across communication networks. In most cases, secure data transmission protocols require encryption of data or messages using a key, which is a secret bit string only known to the sender and the intended receivers. This key transforms the original messages into incomprehensible texts, known as ciphertext, so that any malicious eavesdroppers who spy on the ciphertext can not comprehend the messages without a key. At the other end of the communication channel, the transmitted ciphertext is decrypted by the receiver’s key such that the original messages can be recovered. …
written by Rachata Tosirisuk, CAT Telecom & USC alumni
edited by Dr. Thiparat Chotibut, Chulalongkorn University & QTFT
If you have read Introduction to Modern Cryptography by Jonathan Katz, feel free to skip this article! The article and its sequels attempt to summarize the textbook to laypeople.
Cryptography has been with us for ages. The original formulation was not as complex as the modern one. Its original intention was very simple; to preserve the privacy of the message. …