{"version":"1.0","provider_name":"Web del Museo de Inform\u00e1tica 2.0","provider_url":"https:\/\/museo.inf.upv.es\/en","author_name":"admin","author_url":"https:\/\/museo.inf.upv.es\/en\/blog\/author\/museoinfnueva\/","title":"The origin of Public-key Cryptography - Web del Museo de Inform\u00e1tica 2.0","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"BERvzPN1Bs\"><a href=\"https:\/\/museo.inf.upv.es\/en\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/\">The origin of Public-key Cryptography<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/museo.inf.upv.es\/en\/blog\/2021\/05\/23\/el-origen-de-la-criptografia-de-clave-publica\/embed\/#?secret=BERvzPN1Bs\" width=\"600\" height=\"338\" title=\"&#8220;The origin of Public-key Cryptography&#8221; &#8212; Web del Museo de Inform\u00e1tica 2.0\" data-secret=\"BERvzPN1Bs\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/museo.inf.upv.es\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/museo.inf.upv.es\/wp-content\/uploads\/2021\/05\/NSA-Crypto-Backdoor-1024x768-300x225-1.jpg","thumbnail_width":300,"thumbnail_height":225,"description":"This workshop shows the mathematic foundation of the asymmetric cyphering systems used in nowadays computers. Through some practical activities we will explain differences between public and private key, Kerckhoffs\u2019 principle, Diffie-Hellman algorithm and we will try to break them. This workshop requires the visitors to have some mathematical concepts clear (factorisation, prime numbers), so it [&hellip;]"}