Thursday, August 7, 1997

The Program of Hacking In Progress
Cryptography overview PGP is a very popular tool for encryption and signing with number-theoretical methods like RSA or ElGamal. But there are more powerful applications of these and other algorithms, developed since the revival of cryptology in 1976:
  • blind signatures, electronic coins
  • authentification, the Kerberos system
  • anonymous communication through MIXes
  • electronic votes
  • calls for tenders via net
  • playing poker via net without getting cheated
  • authentification without transferring any information: zero-knowledge
  • exchanging information simultaniously
  • sharing secrets
  • quantum cryptology
This talk by Nils Toedtmann will introduce these applications, the used protocols and algorithms, including a discussion of their in)security.

38th Chaos Communication Congress