... storage, 52 8of Perl source code, 56 2 -56 4product development (government restrictions), 52 7public key, 53 3, 54 3, 54 8 -55 4El Gamal, 55 2 -55 4private key vs., 55 4RSA, 54 9 -55 2random numbers, 56 8shared-secret, ... 213encryption, 52 6, 53 8 -55 4 algorithms (licensing), 52 7authentication vs., 55 9block unit size, 54 7lost/stolen keys, 56 4meet-in-the-middle attacks, 54 3one-time pads, 53 8 -54 0, 54 3password storage, 52 8of ... 50 9prime_encode( ), 50 9prime numbers, 50 4 -52 2caching, 50 5 -51 0El Gamal key, generating, 55 2factoring, 54 9Goldbach conjecture, 52 4Miller-Rabin test, 52 0 -52 2primes( ), 50 5 -51 0, 52 4Prim's minimum spanning...