Cryptography
Modern cryptography uses public algorithms with secret material (keys). These public algorithms are arrived at through large scale “competitions” in which people compete to produce the most secure but efficient algorithm while also inspecting each other’s algorithms (see the NIST AES selection process). In this model of a publicly known encryption algorithm, the most protected element will be the key. Do you think it would […]