The Simple Math Behind Public Key Cryptography
The unique model of this story appeared in Quanta Journal.
For 1000’s of years, if you happen to needed to ship a secret message, there was mainly one technique to do it. You’d scramble the message utilizing a particular rule, recognized solely to you and your meant viewers. This rule acted like the important thing to a lock. In the event you had the important thing, you can unscramble the message; in any other case, you’d want to choose the lock. Some locks are so efficient they will by no means be picked, even with infinite time and sources. However even these schemes endure from the identical Achilles’ heel that plagues all such encryption techniques: How do you get that key into the best fingers whereas preserving it out of the unsuitable ones?
The counterintuitive answer, often known as public key cryptography, depends not on preserving a key secret however quite on making it extensively out there. The trick is to additionally use a second key that you simply by no means share with anybody, even the individual you’re speaking with. It’s solely by utilizing this mixture of two keys—one public, one personal—that somebody can each scramble and unscramble a message.
To grasp how this works, it’s simpler to consider the “keys” not as objects that match right into a lock, however as two complementary substances in an invisible ink. The primary ingredient makes messages disappear, and the second makes them reappear. If a spy named Boris needs to ship his counterpart Natasha a secret message, he writes a message after which makes use of the primary ingredient to render it invisible on the web page. (That is straightforward for him to do: Natasha has revealed a straightforward and well-known components for disappearing ink.) When Natasha receives the paper within the mail, she applies the second ingredient that makes Boris’ message reappear.
On this scheme, anybody could make messages invisible, however solely Natasha could make them seen once more. And since she by no means shares the components for the second ingredient with anybody—not even Boris—she will be certain the message hasn’t been deciphered alongside the way in which. When Boris needs to obtain secret messages, he merely adopts the identical process: He publishes a straightforward recipe for making messages disappear (that Natasha or anybody else can use), whereas preserving one other one only for himself that makes them reappear.
In public key cryptography, the “public” and “personal” keys work identical to the primary and second substances on this particular invisible ink: One encrypts messages, the opposite decrypts them. However as an alternative of utilizing chemical substances, public key cryptography makes use of mathematical puzzles referred to as trapdoor capabilities. These capabilities are straightforward to compute in a single route and very troublesome to reverse. However additionally they include “trapdoors,” items of knowledge that, if recognized, make the capabilities trivially straightforward to compute in each instructions.
One frequent trapdoor operate includes multiplying two massive prime numbers, a straightforward operation to carry out. However reversing it—that’s, beginning with the product and discovering every prime issue—is computationally impractical. To make a public key, begin with two massive prime numbers. These are your trapdoors. Multiply the 2 numbers collectively, then carry out some extra mathematical operations. This public key can now encrypt messages. To decrypt them, you’ll want the corresponding personal key, which accommodates the prime elements—the required trapdoors. With these numbers, it’s straightforward to decrypt the message. Maintain these two prime elements secret, and the message will keep secret.