ABSTRACT

For centuries, various forms of encryption have provided confidentiality of information and have

become integral components of computer communication technology. Early encryption techniques

were based on shared knowledge between the communication participants. Confidentiality and

basic authentication were established by the fact that each participant must know a common secret

to encrypt or decrypt the communication, or as with very early encryption technology, the diameter

of a stick.