Close Menu
    Trending
    • Meghan Markle & Prince Harry Mark 7 Year Wedding Anniversary
    • The Costliest Startup Mistakes Are Made Before You Launch
    • Trump Signs Controversial Law Targeting Nonconsensual Sexual Content
    • Museo facilita el regreso de un artefacto maya de la colección de un filántropo de Chicago
    • Eagles extend head coach Nick Sirianni
    • New book details how Biden’s mental decline was kept from voters : NPR
    • Regeneron buys 23andMe for $256m after bankruptcy | Business and Economy
    • Cheryl Burke Blasts Critics, Defends Appearance in Passionate Video
    Messenger Media Online
    • Home
    • Top Stories
    • Plainfield News
      • Fox Valley News
      • Sports
      • Technology
      • Business
    • International News
    • US National News
    • Entertainment
    • More
      • Product Review
      • Local Business
      • Local Sports
    Messenger Media Online
    Home»Technology»The Simple Math Behind Public Key Cryptography
    Technology

    The Simple Math Behind Public Key Cryptography

    DaveBy DaveDecember 15, 2024No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    The unique model of this story appeared in Quanta Magazine.

    For hundreds of years, in case you needed to ship a secret message, there was principally one strategy to do it. You’d scramble the message utilizing a particular rule, identified solely to you and your supposed viewers. This rule acted like the important thing to a lock. When you had the important thing, you can unscramble the message; in any other case, you’d want to choose the lock. Some locks are so efficient they’ll by no means be picked, even with infinite time and sources. However even these schemes undergo from the identical Achilles’ heel that plagues all such encryption programs: How do you get that key into the appropriate arms whereas holding it out of the improper ones?

    The counterintuitive resolution, often known as public key cryptography, depends not on holding a key secret however reasonably on making it broadly out there. The trick is to additionally use a second key that you just by no means share with anybody, even the individual you’re speaking with. It’s solely through the use of this mix of two keys—one public, one personal—that somebody can each scramble and unscramble a message.

    To grasp how this works, it’s simpler to consider the “keys” not as objects that match right into a lock, however as two complementary elements in an invisible ink. The primary ingredient makes messages disappear, and the second makes them reappear. If a spy named Boris needs to ship his counterpart Natasha a secret message, he writes a message after which makes use of the primary ingredient to render it invisible on the web page. (That is simple for him to do: Natasha has revealed a straightforward and well-known components for disappearing ink.) When Natasha receives the paper within the mail, she applies the second ingredient that makes Boris’ message reappear.

    On this scheme, anybody could make messages invisible, however solely Natasha could make them seen once more. And since she by no means shares the components for the second ingredient with anybody—not even Boris—she might be certain the message hasn’t been deciphered alongside the way in which. When Boris needs to obtain secret messages, he merely adopts the identical process: He publishes a straightforward recipe for making messages disappear (that Natasha or anybody else can use), whereas holding one other one only for himself that makes them reappear.

    In public key cryptography, the “public” and “personal” keys work identical to the primary and second elements on this particular invisible ink: One encrypts messages, the opposite decrypts them. However as a substitute of utilizing chemical compounds, public key cryptography makes use of mathematical puzzles referred to as trapdoor functions. These features are simple to compute in a single route and very tough to reverse. However in addition they comprise “trapdoors,” items of data that, if identified, make the features trivially simple to compute in each instructions.

    One frequent trapdoor perform entails multiplying two giant prime numbers, a straightforward operation to carry out. However reversing it—that’s, beginning with the product and discovering every prime issue—is computationally impractical. To make a public key, begin with two giant prime numbers. These are your trapdoors. Multiply the 2 numbers collectively, then carry out some further mathematical operations. This public key can now encrypt messages. To decrypt them, you’ll want the corresponding personal key, which incorporates the prime elements—the mandatory trapdoors. With these numbers, it’s simple to decrypt the message. Maintain these two prime elements secret, and the message will keep secret.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleDear Abby: Once thrilled about pregnancy, husband turns sour at second trimester
    Next Article Costco Customers Freak Out About Muffin Price Change
    Dave

    Related Posts

    Technology

    Trump Signs Controversial Law Targeting Nonconsensual Sexual Content

    May 19, 2025
    Technology

    A Silicon Valley VC Says He Got the IDF Starlink Access Within Days of October 7 Attack

    May 19, 2025
    Technology

    12 Ways to Upgrade Your Wi-Fi and Make Your Internet Faster (2024)

    May 19, 2025
    Add A Comment

    Comments are closed.

    Top Posts

    December music doings | Music Features

    December 5, 2024

    Lakers’ early exit not on Luka Doncic or indicative of franchise’s future  

    May 1, 2025

    Is Waymo Friend or Foe to Uber?

    February 5, 2025

    Saints’ QB plan revealed after Derek Carr’s retirement

    May 11, 2025

    Josh Gad Says Jake Gyllenhaal Didn’t Approve of ‘The Book of Mormon’

    January 20, 2025
    Categories
    • Business
    • Entertainment
    • Fox Valley News
    • International News
    • Plainfield News
    • Sports
    • Technology
    • Top Stories
    • US National News
    Most Popular

    Army helicopter forces two jetliners to abort DCA landings : NPR

    May 3, 2025

    Carson Hocevar earns pole for Wurth 400 at Texas

    May 3, 2025

    Bulls offseason position analysis: Center of attention this summer

    May 3, 2025
    Our Picks

    Devin Neal carries Kansas to massive upset over Colorado

    November 24, 2024

    S Korea’s Yoon apologises for martial law crisis as impeachment vote looms | Politics News

    December 7, 2024

    Work Better from Anywhere with This Portable Touchscreen Monitor

    December 25, 2024
    Categories
    • Business
    • Entertainment
    • Fox Valley News
    • International News
    • Plainfield News
    • Sports
    • Technology
    • Top Stories
    • US National News
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us
    Copyright © 2024 Messengermediaonline.com All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.