Documente Academic
Documente Profesional
Documente Cultură
ISOM 2010
Lecture 3: Digital Economy (II)
Prof. Michael Zhang
Download: Part II
Moores Law
Metcalfes Law
The value of a
communications network is
proportional to the square of
the number of users of the
system (n2).
Network Effects
Now, for k nodes, how many
k*(k-1)/2
lines are there?
ISOM2010 - Copyright (c) Michael Zhang
Reverse substitution
abcdefghijklmnopqrstuvwx
yz
ZYXWVUTSRQPONMLKJIHGFEDC
BA
I have a secret
I/J
23 15 31 31 34
HELLO
ISOM2010 - Copyright (c) Michael Zhang
Shift by 3
A B C D E F G ..
A B C D E F G ..
YLFWRYB
VICTORY
ISOM2010 - Copyright (c) Michael Zhang
10
11
WWI
During WWI, US army translated secret documents into the
Navajo nations language (a Native Indian nation).
12
Enigma Machine
13
Sending Passwords
Encrypt
The Internet
User
ISOM2010 - Copyright (c) Michael Zhang
Server
14
Without encryption
15
Asymmetric encryption
Key 1 and
encryption algorithm
Key 2 and
encryption algorithm
Ciphertext
Plaintext
Encryption
Decryption
If Key 1 = private, Key2 must be corresponding public
If Key 1 = public, Key2 must be corresponding private
ISOM2010 - Copyright (c) Michael Zhang
16
Hello
Alice!
Key-making
algorithm
Encrypt
6D3N0DS23N
Hello
Alice!
Decrypt
Alices
private key
Alices
public key
Alices
private key
The key is private
17
P1*P2=C
C is public key
P1 and P2 make the private key
18
Anyone can encrypt using the public key, but only the
holder of the private key can decrypt.
Secrecy depends on the secrecy of the private key.
19
Alice
Plaintext
Encrypt
Ciphertext
Decrypt
Plaintext
20
Signatures
Alice
Plaintext
Encrypt
Signed
Message
Decrypt
Bob
Plaintext
21
22
23
24
25
26
Individuals and
Internet is about connecting ______
Individuals to _______.
Information
connecting _____
27
Review
The Bubble Video is on YouTube for review:
https://www.youtube.com/watch?v=aQjnkyoNIfg
28
The End