written by Poompong Chaiwongkhot, a PhD candidate at the Intstitute for Quantum Computing, University of Waterloo, Canada & QTFT.
edited by Dr. Thiparat Chotibut, Chulalongkorn University & QTFT.

Authors’ note: It is highly recommended for uninitiated readers on Cryptography to check out this article before continuing.

Image for post
Image for post
“It is a sad truth that we usually do not discuss the nature of cryptography and its limitation until it is broken…” [image source]

One of the major challenges multinational corporations and governments is facing is the assurance of secure data transmission across communication networks. In most cases, secure data transmission protocols require encryption of data or messages using a key, which is a secret bit string only known to the sender and the intended receivers. This key transforms the original messages into incomprehensible texts, known as ciphertext, so that any malicious eavesdroppers who spy on the ciphertext can not comprehend the messages without a key. At the other end of the communication channel, the transmitted ciphertext is decrypted by the receiver’s key such that the original messages can be recovered. …


written by Rachata Tosirisuk, CAT Telecom & USC alumni
edited by Dr. Thiparat Chotibut, Chulalongkorn University & QTFT

If you have read Introduction to Modern Cryptography by Jonathan Katz, feel free to skip this article! The article and its sequels attempt to summarize the textbook to laypeople.

Image for post
Image for post

Cryptography has been with us for ages. The original formulation was not as complex as the modern one. Its original intention was very simple; to preserve the privacy of the message. …

Thiparat Chotibut

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store