Talk With an Expert

One Fish, Two Fish, Red Fish, Blowfish A History of Cryptography and it's Application in Soci

One Fish, Two Fish, Red Fish, Blowfish A History of Cryptography and it's Application in Soci (PDF, 1.61MB)Published: 27 Jul, 2001
Created by:
Joseph Kasten

Benign to the ordinary end user, crypto sciences are used in almost every electronic device to ordinary computer based software on the home personal computer. From PGP and SSL used in email and web browser packages to Elliptic Curve crypto used in the Palm pilots of tomorrow, the art of hiding messages in unreadable form has undoubtedly weaved its way into every technical facet of society. What will the future bring? Undoubtedly even longer key lengths and even more complex mathematical formulas used in symmetric algorithms. One thing is for certain, eventually there will be a certification offered by some corporation that helps endorse their own particular brand of cipher products, its only a matter of time.