
Tổng quan về mật mã học
Huỳnh Trọng Thưa
htthua@ptithcm.edu.vn

Introduction
•Cryptography was used as a
tool to protect national
secrets and strategies.
•1960s (computers and
communications systems) ->
means to protect information
and to provide security
services.
2

Introduction (cont.)
•1970s: DES (Feistel, IBM) - the most well-known
cryptographic mechanism in history
•1976: public-key cryptography (Diffie and
Hellman)
•1978: RSA (Rivest et al.) - first practical public-key
encryption and signature scheme
•1991: the first international standard for digital
signatures (ISO/IEC 9796) was adopted.
3

Information security and
cryptography
•Some information security objectives
–Privacy or confidentiality
–Data integrity
–Entity authentication or identification
–Message authentication
–Signature
–Authorization
–Validation
–Access control
4

Information security and
cryptography (cont.)
•Some information security objectives
–Certification
–Timestamping
–Witnessing
–Receipt
–Confirmation
–Ownership
–Anonymity
–non-repudiation
–Revocation
5