Close Menu
  • Home
  • World News
  • Latest News
  • Politics
  • Sports
  • Opinions
  • Tech News
  • World Economy
  • More
    • Entertainment News
    • Gadgets & Tech
    • Hollywood
    • Technology
    • Travel
    • Trending News
Trending
  • Sydney Sweeney Events Onerous In Blue Denims Throughout Boozy Evening Out
  • Canadian authorities strikes to finish Air Canada strike, seeks binding arbitration
  • Yamal and Raphinha hearth Barcelona to La Liga opening win at Mallorca | Soccer Information
  • Jones, Richardson leaving Colts with unattainable determination
  • Apple Lastly Destroyed Steve Jobs’ Imaginative and prescient of the iPad. Good
  • Dacre Montgomery Took Appearing Hiatus After ‘Stranger Issues’
  • Melania Trump Will Search $1 Billion From Hunter Biden Except He Retracts Epstein Feedback
  • Tom Cruise & Ana de Armas’ Age Hole Spotlighted By Consultants
PokoNews
  • Home
  • World News
  • Latest News
  • Politics
  • Sports
  • Opinions
  • Tech News
  • World Economy
  • More
    • Entertainment News
    • Gadgets & Tech
    • Hollywood
    • Technology
    • Travel
    • Trending News
PokoNews
Home»Technology»The Easy Math Behind Public Key Cryptography
Technology

The Easy Math Behind Public Key Cryptography

DaneBy DaneDecember 16, 2024No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
The Easy Math Behind Public Key Cryptography
Share
Facebook Twitter LinkedIn Pinterest Email


The unique model of this story appeared in Quanta Journal.

For hundreds of years, in the event you needed to ship a secret message, there was principally one approach to do it. You’d scramble the message utilizing a particular rule, identified solely to you and your supposed viewers. This rule acted like the important thing to a lock. Should you had the important thing, you may unscramble the message; in any other case, you’d want to choose the lock. Some locks are so efficient they will by no means be picked, even with infinite time and assets. However even these schemes endure from the identical Achilles’ heel that plagues all such encryption methods: How do you get that key into the precise arms whereas maintaining it out of the improper ones?

The counterintuitive resolution, often called public key cryptography, depends not on maintaining a key secret however slightly on making it broadly accessible. The trick is to additionally use a second key that you just by no means share with anybody, even the individual you’re speaking with. It’s solely by utilizing this mix of two keys—one public, one non-public—that somebody can each scramble and unscramble a message.

To know how this works, it’s simpler to think about the “keys” not as objects that match right into a lock, however as two complementary elements in an invisible ink. The primary ingredient makes messages disappear, and the second makes them reappear. If a spy named Boris desires to ship his counterpart Natasha a secret message, he writes a message after which makes use of the primary ingredient to render it invisible on the web page. (That is simple for him to do: Natasha has revealed a simple and well-known formulation for disappearing ink.) When Natasha receives the paper within the mail, she applies the second ingredient that makes Boris’ message reappear.

On this scheme, anybody could make messages invisible, however solely Natasha could make them seen once more. And since she by no means shares the formulation for the second ingredient with anybody—not even Boris—she may be certain the message hasn’t been deciphered alongside the way in which. When Boris desires to obtain secret messages, he merely adopts the identical process: He publishes a simple recipe for making messages disappear (that Natasha or anybody else can use), whereas maintaining one other one only for himself that makes them reappear.

In public key cryptography, the “public” and “non-public” keys work similar to the primary and second elements on this particular invisible ink: One encrypts messages, the opposite decrypts them. However as a substitute of utilizing chemical substances, public key cryptography makes use of mathematical puzzles known as trapdoor capabilities. These capabilities are simple to compute in a single course and intensely tough to reverse. However in addition they comprise “trapdoors,” items of data that, if identified, make the capabilities trivially simple to compute in each instructions.

One frequent trapdoor operate entails multiplying two giant prime numbers, a simple operation to carry out. However reversing it—that’s, beginning with the product and discovering every prime issue—is computationally impractical. To make a public key, begin with two giant prime numbers. These are your trapdoors. Multiply the 2 numbers collectively, then carry out some further mathematical operations. This public key can now encrypt messages. To decrypt them, you’ll want the corresponding non-public key, which comprises the prime components—the required trapdoors. With these numbers, it’s simple to decrypt the message. Preserve these two prime components secret, and the message will keep secret.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleBollywood Famous person Aamir Khan Shares He “Secretly Give up Filmmaking”
Next Article Repair Social Safety by lifting the taxable earnings cap
Dane
  • Website

Related Posts

Technology

Apple Lastly Destroyed Steve Jobs’ Imaginative and prescient of the iPad. Good

August 17, 2025
Technology

Acer Predator Helios 16S AI Overview: Nice Efficiency, Annoying Crashes

August 17, 2025
Technology

UN Plastics Treaty Talks As soon as Once more Finish in Failure

August 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Editors Picks
Categories
  • Entertainment News
  • Gadgets & Tech
  • Hollywood
  • Latest News
  • Opinions
  • Politics
  • Sports
  • Tech News
  • Technology
  • Travel
  • Trending News
  • World Economy
  • World News
Our Picks

Police in Spain and Italy Seize 68,000 Gallons of Adulterated Olive Oil

December 5, 2023

Jared Goff reacts to John Morton changing Ben Johnson as OC

February 4, 2025

Opinion | A Rock Climber Finds a Softer Energy

March 24, 2024
Most Popular

Sydney Sweeney Events Onerous In Blue Denims Throughout Boozy Evening Out

August 17, 2025

At Meta, Millions of Underage Users Were an ‘Open Secret,’ States Say

November 26, 2023

Elon Musk Says All Money Raised On X From Israel-Gaza News Will Go to Hospitals in Israel and Gaza

November 26, 2023
Categories
  • Entertainment News
  • Gadgets & Tech
  • Hollywood
  • Latest News
  • Opinions
  • Politics
  • Sports
  • Tech News
  • Technology
  • Travel
  • Trending News
  • World Economy
  • World News
  • Privacy Policy
  • Disclaimer
  • Terms of Service
  • About us
  • Contact us
  • Sponsored Post
Copyright © 2023 Pokonews.com All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.

Ad Blocker Enabled!
Ad Blocker Enabled!
Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.