By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
PulseReporterPulseReporter
  • Home
  • Entertainment
  • Lifestyle
  • Money
  • Tech
  • Travel
  • Investigations
Reading: The Easy Math Behind Public Key Cryptography
Share
Notification Show More
Font ResizerAa
PulseReporterPulseReporter
Font ResizerAa
  • Home
  • Entertainment
  • Lifestyle
  • Money
  • Tech
  • Travel
  • Investigations
Have an existing account? Sign In
Follow US
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
PulseReporter > Blog > Tech > The Easy Math Behind Public Key Cryptography
Tech

The Easy Math Behind Public Key Cryptography

Last updated: December 15, 2024 12:52 pm
5 months ago
Share
The Easy Math Behind Public Key Cryptography
SHARE


The unique model of this story appeared in Quanta Journal.

For hundreds of years, in case you needed to ship a secret message, there was mainly one solution to do it. You’d scramble the message utilizing a particular rule, recognized solely to you and your supposed viewers. This rule acted like the important thing to a lock. In case you had the important thing, you possibly can unscramble the message; in any other case, you’d want to select the lock. Some locks are so efficient they’ll by no means be picked, even with infinite time and assets. However even these schemes endure from the identical Achilles’ heel that plagues all such encryption techniques: How do you get that key into the precise arms whereas maintaining it out of the mistaken ones?

The counterintuitive resolution, often called public key cryptography, depends not on maintaining a key secret however quite on making it broadly out there. The trick is to additionally use a second key that you simply by no means share with anybody, even the particular person you’re speaking with. It’s solely by utilizing this mixture of two keys—one public, one personal—that somebody can each scramble and unscramble a message.

To grasp how this works, it’s simpler to consider the “keys” not as objects that match right into a lock, however as two complementary substances in an invisible ink. The primary ingredient makes messages disappear, and the second makes them reappear. If a spy named Boris needs to ship his counterpart Natasha a secret message, he writes a message after which makes use of the primary ingredient to render it invisible on the web page. (That is simple for him to do: Natasha has revealed a straightforward and well-known formulation for disappearing ink.) When Natasha receives the paper within the mail, she applies the second ingredient that makes Boris’ message reappear.

On this scheme, anybody could make messages invisible, however solely Natasha could make them seen once more. And since she by no means shares the formulation for the second ingredient with anybody—not even Boris—she might be positive the message hasn’t been deciphered alongside the way in which. When Boris needs to obtain secret messages, he merely adopts the identical process: He publishes a straightforward recipe for making messages disappear (that Natasha or anybody else can use), whereas maintaining one other one only for himself that makes them reappear.

In public key cryptography, the “public” and “personal” keys work identical to the primary and second substances on this particular invisible ink: One encrypts messages, the opposite decrypts them. However as a substitute of utilizing chemical substances, public key cryptography makes use of mathematical puzzles referred to as trapdoor features. These features are simple to compute in a single path and very troublesome to reverse. However in addition they comprise “trapdoors,” items of knowledge that, if recognized, make the features trivially simple to compute in each instructions.

One frequent trapdoor perform entails multiplying two massive prime numbers, a straightforward operation to carry out. However reversing it—that’s, beginning with the product and discovering every prime issue—is computationally impractical. To make a public key, begin with two massive prime numbers. These are your trapdoors. Multiply the 2 numbers collectively, then carry out some further mathematical operations. This public key can now encrypt messages. To decrypt them, you’ll want the corresponding personal key, which comprises the prime components—the mandatory trapdoors. With these numbers, it’s simple to decrypt the message. Hold these two prime components secret, and the message will keep secret.

You Might Also Like

An Ohio man responsible of Bitcoin laundering should forfeit over $400 million in property

Applivery raises funds from Supercell for system and software program administration

Trump’s $500 billion AI moonshot: Ambition meets controversy in ‘Challenge Stargate’

Researchers discover you don’t want a ton of information to coach LLMs for reasoning duties

KEF Q Collection Concerto Meta Overview: Candy Sound All Round

Share This Article
Facebook Twitter Email Print
Previous Article 13 Costumes Actors Refused To Put on Or Give up Over 13 Costumes Actors Refused To Put on Or Give up Over
Next Article Enhance Vitality and Embrace Pleasure Enhance Vitality and Embrace Pleasure
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Weekly Newsletter

Subscribe to our newsletter to get our newest articles instantly!

More News

Why Jamie Lee Curtis Had Plastic Surgical procedure At 25
Why Jamie Lee Curtis Had Plastic Surgical procedure At 25
26 minutes ago
Acer unveils AI-powered wearables at Computex 2025
Acer unveils AI-powered wearables at Computex 2025
51 minutes ago
What it is like crusing on Disney Fantasy — some of the beloved ships in Disney’s fleet
What it is like crusing on Disney Fantasy — some of the beloved ships in Disney’s fleet
56 minutes ago
Expensive loss for sports activities staff house owners embedded in Trump tax invoice
Expensive loss for sports activities staff house owners embedded in Trump tax invoice
58 minutes ago
Choose The Finest "Harry Potter" Heroine
Choose The Finest "Harry Potter" Heroine
1 hour ago

About Us

about us

PulseReporter connects with and influences 20 million readers globally, establishing us as the leading destination for cutting-edge insights in entertainment, lifestyle, money, tech, travel, and investigative journalism.

Categories

  • Entertainment
  • Investigations
  • Lifestyle
  • Money
  • Tech
  • Travel

Trending

  • Why Jamie Lee Curtis Had Plastic Surgical procedure At 25
  • Acer unveils AI-powered wearables at Computex 2025
  • What it is like crusing on Disney Fantasy — some of the beloved ships in Disney’s fleet

Quick Links

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Disclaimer
2024 © Pulse Reporter. All Rights Reserved.
Welcome Back!

Sign in to your account