ABSTRACT
For centuries, various forms of encryption have provided confidentiality of information and have
become integral components of computer communication technology. Early encryption techniques
were based on shared knowledge between the communication participants. Confidentiality and
basic authentication were established by the fact that each participant must know a common secret
to encrypt or decrypt the communication, or as with very early encryption technology, the diameter
of a stick.