Cryptography overview PGP is a very popular tool for encryption and signing with number-theoretical methods like RSA or ElGamal. But there are more powerful applications of these and other algorithms, developed since the revival of cryptology in 1976:
- blind signatures, electronic coins
- authentification, the Kerberos system
- anonymous communication through MIXes
- electronic votes
- calls for tenders via net
- playing poker via net without getting cheated
- authentification without transferring any information: zero-knowledge
- exchanging information simultaniously
- sharing secrets
- quantum cryptology
This talk by Nils Toedtmann will introduce these applications, the used protocols and algorithms, including a discussion of their in)security.
Thursday, August 7, 1997
The Program of Hacking In Progress
38th Chaos Communication Congress
-
Chaos Computer Club: how did computer ‘freaks’ in Germany come together?
-
38th Chaos Communication Congress
-
Assange's guest list: the RT reporters, hackers and film-makers who visited embassy