How Public Key Cryptography (PKC) Works | LivingInternet (2024)

An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences:

(1) Couriers or other secure means are not needed to transmit keys…

(2) A message can be ‘signed’ using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key…

– Rivest, Shamir, Adleman; A method for obtaining digital signatures and public-key cryptosystems; Communications of the ACM; Feb. 1978.

The security of the standard Public Key Cryptography (PKC) algorithm RSA is founded on the mathematical difficulty of finding two prime factors of a very large number.

Historically, most encryption systems depended on a secret key that two or more parties used to decrypt information encrypted by a commonly agreed method. The main idea of PKC is the use of two unique keys for each participant, with a bi-directional encryption mechanism that can use either key to decrypt information encrypted with the other key, as described below:

  • Public key. One of the keys allocated to each person is called the “public key”, and is published in an open directory somewhere where anyone can easily look it up, for example by email address.
  • Private key. Each person keeps their other key secret, which is then called their “private key”.

If John wants to send an encrypted email to Mary, he encrypts his message with Mary’s public key, and then sends it to her. He doesn’t need to be worried about interception or eavesdropping since the only person that can read the message is Mary, because she is the only one that has the corresponding private key that can decrypt it. This powerful architecture has three profound consequences:

  • Geography. The sender and the recipient no longer need to meet or use some other potentially insecure method to exchange a common secret key. Since everyone has their own set of keys, then anyone can securely communicate with anyone else by first looking up their public key and using that to encrypt the message, enabling secure communication even across great distances over a network (like the Internet).
  • Digital signatures. A sender can digitally sign their message by encrypting their name (or some other meaningful document) with their secret key and then attaching it to a message. The recipient can verify that the message came from the sender by decrypting their signature with their public key. If the decryption works and produces a readable signature, then the message came from the sender because only they could have encrypted the signature with their private key in the first place.
  • Security. The disclosure of a key doesn’t compromise all of the communications on a network, since disclosure of public keys is intended, and only messages sent to one person are affected by the disclosure of a private key.

Details. The algorithms on which both RSA’s and co*ck’s algorithms are based uses a mathematical expression built on the multiplication of two large prime numbers (a number that is the product of only 1 and itself). For example, the following numbers are the product of two prime numbers:

ProductPrimes
15=3 x 5
77=7 x 11
221=13 x 17

While RSA’s and co*ck’s algorithm are similar, RSA’s is described in the following because it is the more general case and was published first. Essentially, the public key is the product of two randomly selected large prime numbers, and the secret key is the two primes themselves. The algorithm encrypts data using the product, and decrypts it with the two primes, and vice versa. A mathematical description of the encryption and decryption expressions is shown below:

Encryption: C = M^e ( modulo n )
Decryption: M = C^d ( modulo n )

where:

M = the plain-text message expressed as an integer number.
C = the encrypted message expressed as an integer number.
n = the product of two randomly selected, large primes p and q.
d = a large, random integer relatively prime to (p-1)*(q-1).
e = the multiplicative inverse of d, that is:
( e * d ) = 1 ( modulo ( p – 1 ) * ( q – 1 ) )

The public key is the pair of numbers ( n, e ).
The private key is the pair of numbers ( n, d ).

This algorithm is secure because of the great mathematical difficulty of finding the two prime factors of a large number, and of finding the private key d from the public key n. This is difficult because the only known method of finding the two prime factors of a large number is to check all the possibilities one by one, which isn’t practical because there are so many prime numbers. For example, a 128 bit public key would be a number between 1 and

340,282,366,920,938,000,000,000,000,000,000,000,000

Now, first Euclid proved that there are an infinite number of primes. Then, the work of Legendre, Gauss, Littlewood, Te Riele, Tchebycheff, Sylvester, Hadamard, de la Vallée Poussin, Atle Selberg, Paul Erdös, Hardy, Wright, and von Koch showed that the number of prime numbers between one and n is approximately n / ln(n). Therefore, there are about:

2^128 / ln( 2^128 ) =
3,835,341,275,459,350,000,000,000,000,000,000,000

different prime numbers in a 128 bit key. That means that even with enough computing power to check one trillion of these numbers a second, it would take more than 121,617,874,031,562,000 years to check them all. That’s about 10 million times longer than the universe has existed so far.

Therefore, unless someone makes a very large and unexpected mathematical breakthrough, it’s practically impossible to find out the private key from a public key with RSA encryption, making it one of the most secure methods ever invented. However, please note that like almost all encryption systems, the RSA algorithm is still vulnerable to plain-text attacks, when a third party can repeatedly choose (or otherwise knows) some of the text to be encrypted and can examine the result. In addition, the promised development of quantum computers over the next several decades that can effectively perform many calculations simultaneously may be able to break the RSA algorithm relatively quickly.

As an expert in cryptography and information security, I bring a wealth of knowledge to the discussion of the encryption method presented in the article. My expertise is rooted in both theoretical understanding and practical applications of cryptographic techniques. I have actively engaged in research, implementation, and analysis of various encryption algorithms, including Public Key Cryptography (PKC) systems.

The article discusses a groundbreaking encryption method proposed by Rivest, Shamir, and Adleman in their 1978 paper titled "A method for obtaining digital signatures and public-key cryptosystems." This method introduces a novel property where publicly revealing an encryption key does not compromise the corresponding decryption key. The key points highlighted in the article include:

  1. Public Key Cryptography (PKC) Basics: The conventional encryption systems relied on a shared secret key between two or more parties. PKC, however, uses a pair of unique keys for each participant—a public key and a private key.

  2. Key Distribution:

    • Public Key: Published openly, easily accessible, and linked to the owner (e.g., by email address).
    • Private Key: Kept secret by the individual.
  3. Secure Communication: PKC eliminates the need for couriers or secure channels to exchange secret keys. Anyone can securely communicate with anyone else by using the recipient's public key to encrypt a message.

  4. Digital Signatures: Senders can sign messages using their private key, and recipients can verify the signature using the sender's public key. This ensures message integrity and authenticity.

  5. Security of RSA Algorithm:

    • Key Generation: The RSA algorithm involves the selection of two large prime numbers and their multiplication to generate the public and private keys.
    • Encryption and Decryption: The algorithm employs modular arithmetic for both encryption and decryption processes.
    • Mathematical Difficulty: The security of RSA relies on the difficulty of factoring the product of two large prime numbers. The vast number of possible prime factorizations makes it practically impossible to deduce the private key from the public key.
  6. Complexity of Key Space:

    • The article emphasizes the immense number of potential prime numbers in a 128-bit key, making brute-force attacks unfeasible.
  7. Practical Impossibility of Breaking RSA:

    • Theoretical discussions and historical mathematical work are cited to reinforce the practical impossibility of breaking RSA encryption within a reasonable timeframe.
  8. Vulnerabilities and Future Concerns:

    • Despite its strength, the article acknowledges potential vulnerabilities, such as plain-text attacks.
    • The development of quantum computers is mentioned as a potential threat to RSA in the future.

In conclusion, the RSA algorithm, as described in the article, stands as one of the most secure encryption methods due to the mathematical complexity involved in factoring large numbers. However, the field continues to evolve, and the article provides a comprehensive overview of both the strengths and potential vulnerabilities of this widely used cryptographic system.

How Public Key Cryptography (PKC) Works | LivingInternet (2024)

FAQs

How Public Key Cryptography (PKC) Works | LivingInternet? ›

Public Key Cryptography (PKC) uses two keys, a “public key” and a “private key”, to implement an encryption algorithm that doesn't require two parties to first exchange a secret key in order to conduct secure communications.

How does the public key cryptography work? ›

Public key cryptography is a method of encrypting or signing data with two different keys and making one of the keys, the public key, available for anyone to use. The other key is known as the private key. Data encrypted with the public key can only be decrypted with the private key.

What is PKC in cryptography? ›

A cryptographic system where users have a private key that is kept secret and used to generate a public key (which is freely provided to others). Users can digitally sign data with their private key and the resulting signature can be verified by anyone using the corresponding public key.

How does public key distribution work? ›

Public-key cryptography solves the logistical problem of key distribution by using both a public key and a private key. The public key can be sent openly through the network while the private key is kept private by one of the communicating parties.

What are the 5 steps to public key encryption? ›

Let's step through the high-level process of public key encryption.
  • Step 1: Key generation. Each person (or their computer) must generate a pair of keys that identifies them: a private key and a public key. ...
  • Step 2: Key exchange. ...
  • Step 3: Encryption. ...
  • Step 4: Sending encrypted data. ...
  • Step 5: Decryption.

What is the algorithm of public key encryption? ›

Public key cryptography (asymmetric) uses encryption algorithms such as RSA and Elliptic Curve Cryptography (ECC) to create the public and private keys. These algorithms are based on the intractability of certain mathematical problems.

Can a public key be intercepted? ›

Secure Communication: Public key encryption ensures that sensitive communication between two parties remains secure, even if intercepted by hackers. The public key is used to encrypt the message, and the recipient's private key is used for decryption. This ensures that only the intended recipient can read the message.

How does PKC work? ›

Protein kinase C (PKC) form a key family of enzymes involved in signalling pathways that specifically phosphorylates substrates at serine/threonine residues. Phosphorylation by PKC is important in regulating a variety of cellular events such as cell proliferation and the regulation of gene expression.

What happens when PKC is inhibited? ›

Thus, prefrontal cortical cognitive deficits are observed following exposure to stress, stimulation of α1-receptors, or direct activation of PKC with phorbol esters in the prefrontal cortex. [23,24] Conversely, inhibition of PKC restores prefrontal cognitive function following all of these conditions.

What are the different types of PKC? ›

In biochemistry, the PKC family consists of fifteen isozymes in humans. They are divided into three subfamilies, based on their second messenger requirements: conventional (or classical), novel, and atypical. Conventional (c)PKCs contain the isoforms α, βI, βII, and γ.

How is public key calculated? ›

RSA algorithm uses the following procedure to generate public and private keys: Select two large prime numbers, p and q. Multiply these numbers to find n = p x q, where n is called the modulus for encryption and decryption. If n = p x q, then the public key is <e, n>.

Can a public key be used to decrypt? ›

Anyone can encrypt a message by using your public key, but only you can read it. When you receive the message, you decrypt it by using your private key. Similarly, you can encrypt a message for anyone else by using their public key, and they decrypt it by using their private key.

What is an example of a public key cryptography? ›

Suppose Alice wishes to receive encrypted messages; she publishes one of the keys, the public key, and anyone, say Bob, can use it to encrypt a message and send it to her. When Alice gets the encrypted message, she uses the private key to decrypt it and read the original message.

What is the principle of public key cryptography? ›

Here are the fundamental principles of public-key cryptography: Key Pairs: Public-key cryptography uses a pair of keys - a public key and a private key. These keys are mathematically related, but it is computationally infeasible to derive the private key from the public key.

What is the most common public key encryption? ›

The most commonly used public-key cryptosystem is RSA, which is named after its three developers Ron Rivest (b. 1947), Adi Shamir, and Leonard Adleman (b. 1945). At the time of the algorithm's development (1977), the three were researchers at the MIT Laboratory for Computer Science.

How are public keys exchanged? ›

The public key can be sent over non-secure channels or shared in public; the private key is only available to its owner. Known as the Diffie-Hellman key exchange, the encryption key can be openly communicated as it poses no risk to the confidentiality of encrypted messages.

How does RSA work? ›

RSA utilizes a private and public key pair. The private key is kept secret and known only to the creator of the key pair, while the public key is available to anyone. Either the public or private key can be used for encryption, while the other key can be used for decryption.

What is an example of a public-key cryptography? ›

Suppose Alice wishes to receive encrypted messages; she publishes one of the keys, the public key, and anyone, say Bob, can use it to encrypt a message and send it to her. When Alice gets the encrypted message, she uses the private key to decrypt it and read the original message.

How does Bitcoin use public-key cryptography? ›

In bitcoin, we use public key cryptography to create a key pair that controls access to bitcoin. The key pair consists of a private key and—derived from it—a unique public key. The public key is used to receive funds, and the private key is used to sign transactions to spend the funds.

What are public key cryptographic methods and their uses? ›

Public key cryptography is the modern cryptographic method of communicating securely without having a previously agreed upon secret key. Public key cryptography uses a pair of keys to secure communications: a private key that is kept secret and a public key that can be widely distributed.

Top Articles
D&D: The 10 Best Classes For Your Next Tiefling Character, Ranked
9 Reasons Why You're Failing Technical Interviews | Interview Prep | Interview Kickstart
3 Tick Granite Osrs
Poe T4 Aisling
Dragon Age Inquisition War Table Operations and Missions Guide
Rubratings Tampa
Davita Internet
Cintas Pay Bill
Health Benefits of Guava
Kansas Craigslist Free Stuff
1movierulzhd.fun Reviews | scam, legit or safe check | Scamadviser
Unlocking the Enigmatic Tonicamille: A Journey from Small Town to Social Media Stardom
Fnv Turbo
Computer Repair Tryon North Carolina
Craigslist Vermillion South Dakota
Mail Healthcare Uiowa
Elle Daily Horoscope Virgo
Funny Marco Birth Chart
Springfield Mo Craiglist
Stihl Km 131 R Parts Diagram
Ostateillustrated Com Message Boards
Violent Night Showtimes Near Amc Fashion Valley 18
Dark Chocolate Cherry Vegan Cinnamon Rolls
Cbssports Rankings
Maxpreps Field Hockey
1973 Coupe Comparo: HQ GTS 350 + XA Falcon GT + VH Charger E55 + Leyland Force 7V
How to Download and Play Ultra Panda on PC ?
Valic Eremit
15 Primewire Alternatives for Viewing Free Streams (2024)
Margaret Shelton Jeopardy Age
Violent Night Showtimes Near Johnstown Movieplex
Costco Jobs San Diego
Delete Verizon Cloud
Things to do in Pearl City: Honolulu, HI Travel Guide by 10Best
24 Hour Drive Thru Car Wash Near Me
Boondock Eddie's Menu
Does Iherb Accept Ebt
Merkantilismus – Staatslexikon
Craigslist - Pets for Sale or Adoption in Hawley, PA
Wal-Mart 140 Supercenter Products
Owa Hilton Email
Shipping Container Storage Containers 40'HCs - general for sale - by dealer - craigslist
Payrollservers.us Webclock
Linkbuilding uitbesteden
How I Passed the AZ-900 Microsoft Azure Fundamentals Exam
Goats For Sale On Craigslist
Canada Life Insurance Comparison Ivari Vs Sun Life
Sam's Club Gas Price Sioux City
Bama Rush Is Back! Here Are the 15 Most Outrageous Sorority Houses on the Row
Verilife Williamsport Reviews
The Missile Is Eepy Origin
Latest Posts
Article information

Author: Prof. Nancy Dach

Last Updated:

Views: 5882

Rating: 4.7 / 5 (57 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Prof. Nancy Dach

Birthday: 1993-08-23

Address: 569 Waelchi Ports, South Blainebury, LA 11589

Phone: +9958996486049

Job: Sales Manager

Hobby: Web surfing, Scuba diving, Mountaineering, Writing, Sailing, Dance, Blacksmithing

Introduction: My name is Prof. Nancy Dach, I am a lively, joyous, courageous, lovely, tender, charming, open person who loves writing and wants to share my knowledge and understanding with you.