• The School of Business
  • The School of Arts
  • The School of Wellness
  • The School of Fitness
  • The School of Public Affairs
Tuesday, September 2, 2025
  • Login
  • Register
The Voice of Main Street Business
No Result
View All Result
  • The School of Business
  • The School of Arts
  • The School of Wellness
  • The School of Fitness
  • The School of Public Affairs
No Result
View All Result
The Voice of Main Street Business

The Simple Math Behind Public Key Cryptography

The Owner Press by The Owner Press
December 15, 2024
in Uncategorized
Reading Time: 3 mins read
A A
0
Share on FacebookShare on Twitter


The unique model of this story appeared in Quanta Magazine.

For hundreds of years, if you happen to wished to ship a secret message, there was mainly one technique to do it. You’d scramble the message utilizing a particular rule, identified solely to you and your meant viewers. This rule acted like the important thing to a lock. In the event you had the important thing, you may unscramble the message; in any other case, you’d want to choose the lock. Some locks are so efficient they’ll by no means be picked, even with infinite time and assets. However even these schemes endure from the identical Achilles’ heel that plagues all such encryption programs: How do you get that key into the precise palms whereas protecting it out of the improper ones?

The counterintuitive answer, generally known as public key cryptography, depends not on protecting a key secret however slightly on making it extensively accessible. The trick is to additionally use a second key that you simply by no means share with anybody, even the particular person you’re speaking with. It’s solely through the use of this mixture of two keys—one public, one non-public—that somebody can each scramble and unscramble a message.

To grasp how this works, it’s simpler to think about the “keys” not as objects that match right into a lock, however as two complementary components in an invisible ink. The primary ingredient makes messages disappear, and the second makes them reappear. If a spy named Boris desires to ship his counterpart Natasha a secret message, he writes a message after which makes use of the primary ingredient to render it invisible on the web page. (That is simple for him to do: Natasha has printed a simple and well-known components for disappearing ink.) When Natasha receives the paper within the mail, she applies the second ingredient that makes Boris’ message reappear.

On this scheme, anybody could make messages invisible, however solely Natasha could make them seen once more. And since she by no means shares the components for the second ingredient with anybody—not even Boris—she may be certain the message hasn’t been deciphered alongside the best way. When Boris desires to obtain secret messages, he merely adopts the identical process: He publishes a simple recipe for making messages disappear (that Natasha or anybody else can use), whereas protecting one other one only for himself that makes them reappear.

In public key cryptography, the “public” and “non-public” keys work similar to the primary and second components on this particular invisible ink: One encrypts messages, the opposite decrypts them. However as a substitute of utilizing chemical compounds, public key cryptography makes use of mathematical puzzles referred to as trapdoor functions. These features are simple to compute in a single course and very tough to reverse. However in addition they include “trapdoors,” items of data that, if identified, make the features trivially simple to compute in each instructions.

One widespread trapdoor operate entails multiplying two massive prime numbers, a simple operation to carry out. However reversing it—that’s, beginning with the product and discovering every prime issue—is computationally impractical. To make a public key, begin with two massive prime numbers. These are your trapdoors. Multiply the 2 numbers collectively, then carry out some extra mathematical operations. This public key can now encrypt messages. To decrypt them, you’ll want the corresponding non-public key, which accommodates the prime elements—the required trapdoors. With these numbers, it’s simple to decrypt the message. Preserve these two prime elements secret, and the message will keep secret.



Source link

Tags: CryptographykeyMathPublicSimpleThe School of Tech
Share30Tweet19
Previous Post

‘I thought I’d been microchipped’: How abusers spy on partners with ‘parental control’ apps | UK News

Next Post

Searching for Syria’s Disappeared – The New York Times

Recommended For You

UK calls for restraint after Israel launches airstrikes on Iran | Politics News
Business News

UK calls for restraint after Israel launches airstrikes on Iran | Politics News

by The Owner Press
June 14, 2025
The world’s trustbusters hint that they want more deals
Business News

The world’s trustbusters hint that they want more deals

by The Owner Press
March 7, 2025
News live: Australian journalist reportedly shot with rubber bullet while covering LA protests; rescuers search for snowed-in drivers | Australia news
Business News

News live: Australian journalist reportedly shot with rubber bullet while covering LA protests; rescuers search for snowed-in drivers | Australia news

by The Owner Press
June 9, 2025
Celeb-Favorite MOTHER Marks 10 Years of the Iconic Hustler Jeans — in Style
Business News

Celeb-Favorite MOTHER Marks 10 Years of the Iconic Hustler Jeans — in Style

by The Owner Press
August 15, 2025
COP29: The almighty row over climate cash that’s about to boil over | Science, Climate & Tech News

COP29: The almighty row over climate cash that’s about to boil over | Science, Climate & Tech News

by The Owner Press
November 8, 2024
Next Post
Searching for Syria’s Disappeared – The New York Times

Searching for Syria’s Disappeared - The New York Times

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

LEARN FROM TOP VERIFIED OWNERS

From Chair to CEO: Barbershop Ownership with Kwan

From Chair to CEO: Barbershop Ownership with Kwan

Ready to own the shop instead of just cutting in...
User Avatar The Owner Press
Book an Office Hour

Related News

EBONY Power 100 Gala Best Dressed Celebs: Meagan Good Stuns in a Yellow Eteri Couture Gown, Yung Miami Poses in Rafik Saki, and Usher in Ferragamo and Hermes + More!

EBONY Power 100 Gala Best Dressed Celebs: Meagan Good Stuns in a Yellow Eteri Couture Gown, Yung Miami Poses in Rafik Saki, and Usher in Ferragamo and Hermes + More!

November 19, 2024
Top U.N. court to hear climate change case : NPR

Top U.N. court to hear climate change case : NPR

December 2, 2024
‘Didn’t Know I’d Fall Off As Quickly As I Did’

‘Didn’t Know I’d Fall Off As Quickly As I Did’

August 4, 2025

The Owner School

September 2025
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
2930  
« Aug    

Recent Posts

Italy hits back at French PM's "fiscal dumping" claim

Italy hits back at French PM's "fiscal dumping" claim

September 2, 2025
Starmer to hold first cabinet meeting since No 10 shakeup – as he declares start of ‘phase two’ | Politics News

Starmer to hold first cabinet meeting since No 10 shakeup – as he declares start of ‘phase two’ | Politics News

September 2, 2025
Mexico’s Cartels Are Using Military Weapons

Mexico’s Cartels Are Using Military Weapons

September 2, 2025

CATEGORIES

  • Business News
  • The School of Arts
  • The School of Business
  • The School of Fitness
  • The School of Public Affairs
  • The School of Wellness

BROWSE BY TAG

Australia big Cancer China climate Day deal Donald Elon Entertainment Football Gaza government Health League live Money News NPR people Politics reveals Science scientists Season Set Star Starmer Study talks tariff tariffs Tech Time Top trade Trump Trumps U.S Ukraine War White win World years

RECENT POSTS

  • Italy hits back at French PM's "fiscal dumping" claim
  • Starmer to hold first cabinet meeting since No 10 shakeup – as he declares start of ‘phase two’ | Politics News
  • Mexico’s Cartels Are Using Military Weapons
  • The School of Business
  • The School of Arts
  • The School of Wellness
  • The School of Fitness
  • The School of Public Affairs

© 2024 The Owner Press | All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • The School of Business
  • The School of Arts
  • The School of Wellness
  • The School of Fitness
  • The School of Public Affairs
  • Login
  • Sign Up

© 2024 The Owner Press | All Rights Reserved