v10 Chapter 2106: Diligent and thrifty schoolmaster (1/2)

Everyone has heard about public key cryptography.

It's just that they have heard about it, but they haven't seen it with their own eyes. Many of them are far away from today's computer world, and still an unsolved mystery.

But now, the inventor of public key cryptography has brought him to the eyes of everyone.

Once they were desperate to know about public key cryptography, but when Martin Hellman asked to analyze the public key cryptography on the spot, they were still surprised!

This sentence, like a whirlwind, instantly swept everyone's heads, shaking everyone's heads...

——

In the audience, Qin Luo rubbed his ears to relieve the discomfort caused by the impact of the loud sound.

Of course, his discomfort did not come from MartinHellman. After all, he had already expected MartinHellman's subject, so he was not too surprised.

His discomfort came from the exclamation of the crowd of audience eating melons around him.

As loud as you want!

Emmmm, to be honest, are you so surprised?

Qin Luo also heard about public key encryption.

Public key encryption, also known as asymmetric (key) encryption (publickey encryption), belongs to the second-level discipline of network security under communication technology, and refers to the corresponding pair of unique keys (that is, public key and private key) Composition encryption method. It solves the issue and management of keys and is the core of current commercial cryptography. In the public key encryption system, what is not disclosed is plaintext, but what is disclosed is ciphertext, public key, and algorithm.

His main field is in the business field. This technology can realize safe and efficient Internet transactions and is often used to transfer trillions of dollars every day.

At the same time, it can be used to encrypt things.

It can be said unceremoniously that Martin Hellman’s invention adds a security lock for dangerous Internet payments.

Let every money run in a safe mode, MartinHellman's contribution to computer network security is unparalleled.