i'm ray perlner, i work at the information technology laboratory at n.i.s.t., the national institute of standards and technology. n.i.s.t. has been setting standards in cryptography for over 25 years. so here is the crypto lab, and in here we do a variety of software testing on both encryption standards and operating systems and anything else that might be security-sensitive. here is an antique from 1980, older than i am. this implements the n.i.s.t. data encryption algorithm. we don't need this machine because any desktop pc can do the work that this used to do. because the algorithm implemented by this machine is a secret-key algorithm, in order to use it, you need sender and recipient to share a secret, which in general is not true of any two computers that you pick randomly communicating using the internet. this is where public-key cryptography comes in. public-key cryptography is a product of prime numbers, n=pq. in addition to n will be a public exponent, e. with public-key algorithms, only the recipient needs to know a secret, and the recipient just needs to securely get the p