Imagine that two people who share an important secret have to leave. So they need to share private information remotely. But let’s say that Fatma, who eavesdrops, also wants this information and can reach the messages of the two. Therefore, Ayşe decides to communicate with a letter written in different secret codes. Ayşe first locks her message in a box and then only she and Ahmet knows the combination of the lock she uses. We call this encryption. Then the locked message is sent to Ahmet. When Ahmet receives the box, he opens it with the code they found before. We call decoding. When we do not use physical locks and start using passwords instead, cryptography happens. You can think of them as virtual locks. Cryptos enable Ayşe and Ahmet to mess up their messages and then resolve it. So even if Fatma reaches the message, the message will be safe because the message will be meaningless to her. Cryptography has been used for thousands of years. It was used in wars and is still at the heart of the worldwide communications network. To better understand the great story of cryptography, we need to understand two old ideas about number and probability theories.
A new problem arises in the twentieth century. What if Ayşe and Berk never come together to share the key?
Let me talk about some basic principles.
For a given event A, probability p (A) is represented by a number ranging from 0 to 1. For an impossible event, the probability is 0 and the probability of an event that will happen is 1.
Source: Khan Academy Turkey, Wikipedia


