create account

RE: Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation) by samminator

View this thread on: hive.blogpeakd.comecency.com

Viewing a response to: @lemony-cricket/introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns

· @samminator ·
$0.08
I once heard about _Quantum Cryptography_ (can't remember where though), but I want to ask; does it have any direct/indirect relationship with any of the cipher methods you listed in the post? If yes, which of them?

PS: That image on the right (in the exercise you gave) looks like it had some hidden Steganographic codes in it - I mean; like some text codes are being hidden in it. I might be wrong though.

Nice post there
👍  
properties (23)
authorsamminator
permlinkre-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180718t072312905z
categorysteemstem
json_metadata{"tags":["steemstem"],"app":"steemit/0.1"}
created2018-07-18 07:13:51
last_update2018-07-18 07:13:51
depth1
children2
last_payout2018-07-25 07:13:51
cashout_time1969-12-31 23:59:59
total_payout_value0.060 HBD
curator_payout_value0.019 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length425
author_reputation672,708,654,474,366
root_title"Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id65,083,697
net_rshares38,816,488,984
author_curate_reward""
vote details (1)
@lemony-cricket · (edited)
Quantum cryptography actually has much stronger ties to information theory than the cryptography we're talking about here. There's also _quantum-resistant cryptography_, which aims to re-create the existing systems we have in ways that are resistant to quantum computers. 

The algorithms most endangered by the ever-looming threat of generalised quantum computing are actually our most popular _public key cryptography_ schemes. Symmetric cryptography (where the key is the same on both sides; the block ciphers and stream ciphers we've been learning about) is actually mostly safe from that stuff.

It's not steganography, but if I can fit it in, I'd love to do a post on steganography! Maybe I'll do it as a separate post. If I do I'll credit you for giving me the idea!
properties (22)
authorlemony-cricket
permlinkre-samminator-re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180718t095824599z
categorysteemstem
json_metadata{"tags":["steemstem"],"app":"steemit/0.1"}
created2018-07-18 09:58:27
last_update2018-07-19 00:48:36
depth2
children1
last_payout2018-07-25 09:58:27
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length773
author_reputation15,797,102,626,770
root_title"Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id65,097,441
net_rshares0
@samminator ·
Thanks a lot. I would be honoured
properties (22)
authorsamminator
permlinkre-lemony-cricket-re-samminator-re-lemony-cricket-introductiontocryptographyiencryptionpt4-blockciphersmodesofoperation-uvwtiotwns-20180718t235033772z
categorysteemstem
json_metadata{"tags":["steemstem"],"app":"steemit/0.1"}
created2018-07-18 23:41:21
last_update2018-07-18 23:41:21
depth3
children0
last_payout2018-07-25 23:41:21
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length33
author_reputation672,708,654,474,366
root_title"Introduction to Cryptography I: Encryption (Pt. 4 - Block Ciphers/Modes of Operation)"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id65,173,274
net_rshares0