Viewing a response to: @lemony-cricket/introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns
I once heard about _Quantum Cryptography_ (can't remember where though), but I want to ask; does it have any direct/indirect relationship with any of the cipher methods you listed in the post? If yes, which of them? PS: That image on the right (in the exercise you gave) looks like it had some hidden Steganographic codes in it - I mean; like some text codes are being hidden in it. I might be wrong though. Nice post there
author | samminator |
---|---|
permlink | re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180718t072312905z |
category | steemstem |
json_metadata | {"tags":["steemstem"],"app":"steemit/0.1"} |
created | 2018-07-18 07:13:51 |
last_update | 2018-07-18 07:13:51 |
depth | 1 |
children | 2 |
last_payout | 2018-07-25 07:13:51 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.060 HBD |
curator_payout_value | 0.019 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 425 |
author_reputation | 672,708,654,474,366 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 65,083,697 |
net_rshares | 38,816,488,984 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
lemony-cricket | 0 | 38,816,488,984 | 70% |
Quantum cryptography actually has much stronger ties to information theory than the cryptography we're talking about here. There's also _quantum-resistant cryptography_, which aims to re-create the existing systems we have in ways that are resistant to quantum computers. The algorithms most endangered by the ever-looming threat of generalised quantum computing are actually our most popular _public key cryptography_ schemes. Symmetric cryptography (where the key is the same on both sides; the block ciphers and stream ciphers we've been learning about) is actually mostly safe from that stuff. It's not steganography, but if I can fit it in, I'd love to do a post on steganography! Maybe I'll do it as a separate post. If I do I'll credit you for giving me the idea!
author | lemony-cricket |
---|---|
permlink | re-samminator-re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180718t095824599z |
category | steemstem |
json_metadata | {"tags":["steemstem"],"app":"steemit/0.1"} |
created | 2018-07-18 09:58:27 |
last_update | 2018-07-19 00:48:36 |
depth | 2 |
children | 1 |
last_payout | 2018-07-25 09:58:27 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 773 |
author_reputation | 15,797,102,626,770 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 65,097,441 |
net_rshares | 0 |
Thanks a lot. I would be honoured
author | samminator |
---|---|
permlink | re-lemony-cricket-re-samminator-re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180718t235033772z |
category | steemstem |
json_metadata | {"tags":["steemstem"],"app":"steemit/0.1"} |
created | 2018-07-18 23:41:21 |
last_update | 2018-07-18 23:41:21 |
depth | 3 |
children | 0 |
last_payout | 2018-07-25 23:41:21 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 33 |
author_reputation | 672,708,654,474,366 |
root_title | "Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 65,173,274 |
net_rshares | 0 |