【Lecture12】Computer Systems & Networks
Cryptography

- Public Key Cryptography
- Secret Key Cryptography
- Hash Functions
Secret Key Cryptography

Public Key Cryptography
確かにmoduloを使ったらハックするのはほぼ不可能だよね
You can know how digital certificate is important
About cryptography
Hash
匿名のアルゴリズムに従って解読不可能の暗号を作るもの。
Example
Hello
→185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969
hello
→2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824
→185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969
hello
→2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824
上の例のように、大文字小文字の違いたけでも全く違う暗号が作られる。(with some certain amount of bits, If that was SHA256, which means it produces the hash by 256 bits)
» SHA256