ESP Biography



GERALD TENG, ESP Teacher




Major: Management Science & Engineering

College/Employer: Stanford

Year of Graduation: G

Picture of Gerald Teng

Brief Biographical Sketch:

Not Available.



Past Classes

  (Clicking a class title will bring you to the course's section of the corresponding course catalog)

C1096: An Introduction to Modern Cryptography and RSA in Splash! Fall 2010 (Nov. 13 - 14, 2010)
ow do you share a secret so that no-one can eavesdrop and find out what it is? How do you sign a message so that whoever receives it can be sure it came from you? The modern solution to these problems was discovered 30 years ago by three mathematicians from MIT and relies on an amazingly elegant yet difficult math problem that is 2000 years old. The result of their work is the RSA algorithm which forms the basis for digital security in today's world, ensuring your online passwords remain secret while also protecting you from "phishing" scams. We'll go through a brief history of cryptography to show the fundamental weaknesses of classical cryptographic systems. We then go through how the RSA algorithm works and how it is used for public key cryptography and digital signatures. A background in basic number theory (primes, modulo arithmetic) will be helpful but not essential.


C374: An Introduction to Modern Cryptography and RSA in Splash! Spring 2009 (Apr. 04 - 05, 2009)
How do you share a secret so that no-one can eavesdrop and find out what it is? How do you sign a message so that whoever receives it can be sure it came from you? The modern solution to these problems was discovered 30 years ago by three mathematicians from MIT and relies on an amazingly elegant yet difficult math problem that is 2000 years old. The result of their work is the RSA algorithm which forms the basis for digital security in today's world, ensuring your online passwords remain secret while also protecting you from "phishing" scams. We'll go through a brief history of cryptography to show the fundamental weaknesses of classical cryptographic systems. We then go through how the RSA algorithm works and how it is used for public key cryptography and digital signatures. A background in basic number theory (primes, modulo arithmetic) will be helpful but not essential.