Cryptography

THE ART OF CRYPTOGRAPHY 


Table of contents 

  • What is cryptography? 
  • Protocols
  • understanding cryptographic methods
  • math behind encryption

What is cryptography?

Cryptography involves the hiding or coding of information using keys such that only the intended recipient can view it. It is crucial to encrypt data so that it does not get forged or tampered by any untrusted parties such that the privacy and confidentiality of the messages is kept known only to the sender and recipient. 


Protocols

There are two types of encryption protocols:

  • SSL
  • TLS
Both are encryption protocols for the internet's transport layer help to protect data on webservers and websites. They rely on a set of private and public keys to encode messages into meaningless form so that it cannot be read by anyone who does not know how to decode it. But to use both protocols, a certificate needs to be installed on the server. 

Example: 

Have you ever noticed that a webpage address starts with "https://"? 

The "s" at the end stands for "secure" which uses SSL as an encryption tool. 


Understanding cryptographic method

The encrypted message is also known as the "cipher text". 

Ciphers make use of mathematical procedures called algorithms to transform messages into unreadable jumbles. The keys used in the cryptographic methods are also mathematical values. 

For example, if we encipher a message by replacing each letter with its numerical equivalent (A= 1, B=2, C=3, and so on) and then multiplying the results (cipher text) by some number Y (Y = key to the algorithm). 


Suppose the key is 5, and the cipher text is "5 100 100 5 15 55". 

To obtain the original text, divide the numbers with the key, i.e., 5/5 =1 100/5=20, etc.

We obtain, 1 20 20 1 3 11 which are then replaced with their equivalent letters and turns to "attack" word. 

Now, we know the multiplying numbers as the product p and q which are the only factors. 

Hence, if one wants to read the encrypted message, one will have to factor xy back into the prime numbers x and y. 


Math behind encryption 

It might be simple to multiply numbers together, especially with computers. But it might be difficult to actually factorize the numbers. Even if we are asked to multiply big numbers together, we can simply punch those numbers into a calculator, however, obtaining the factors might be harder. 


Simply remember these:

  • N= xy
  • N is the public key 
  • if we have x and y, we can obtain N
  • if we have N, it is impossible to find x and y (or might be varied) 
  • factor N to obtain x and y 


disclaimer: to be completed...








Comments

Popular posts from this blog

UPLOADING & CLONING ON GITHUB

BetterCap