Outreach
Public-key cryptography
-
My Hungarian and English presentations. This guides the first 45 minutes of discussion. We talk about the history of coding, modern requirements and various real-life scenarios. I bring an actual chain and locks to demonstrate the Diffie-Hellman key-exchange.
- In the second part, class activities are based on Bell et al., Keller et al. and
Rosemond.
- We use graphs, as the public key, to code a natural number. First, the students work in pairs to code numbers for us. Then, they try to decode a number that was coded by us. While the students calculate, we decode their cyphers quickly by knowing an exact dominating set in the graph; the latter is the private key.
- We discuss complexity, speed, how to generate keys and whether this particular technique is applicable in real life.
- Past lectures: Eötvös József Gimnázium (2018/10/18), ELTE Trefort Ágoston Gyakorló Gimnázium (2018/11/12).
|
Further materials
Teaching dossier: download here (password protected).
|