Download a PDF of this page here.
Download the Spanish version here.
Essential Concepts
- Cryptography involves using techniques to obscure a message so that unauthorized individuals cannot read it. It consists of two main steps: encryption and decryption.
- Encryption is the process of converting plain text or data into an encoded format that can only be read by authorized parties who possess the appropriate decryption key.
- Decryption is the process of converting the encrypted data back into its original, readable form using the appropriate decryption key. Only authorized parties who possess the correct key can decrypt the information and access the original plain text or data.
- A substitution cipher is a type of encryption where each letter in a message is replaced with a different letter or symbol based on a special pattern or rule. It’s kind of like creating a secret code where each letter has a special substitute.
- A brute force attack is a way to crack encryption by trying out all possible keys until the right one is found. It’s like trying every possible combination to unlock a lock.
- A transposition cipher is a type of encryption where the order of letters in a message is changed to make it harder to understand.
- Public key cryptography helps two parties agree on a secret key without others being able to figure it out, using special math and two keys (a public one and a private one) to encrypt and decrypt the information, making sure it’s secure and authentic.
- The modulus refers to the remainder obtained when one number is divided by another. It tells us what is left over after the division.
- RSA is a popular method for keeping messages secure. It uses two special keys: a public key that anyone can use to lock up messages and a private key that only the intended recipient has to unlock them. RSA’s security is based on the difficulty of factoring large numbers.
Glossary
brute force attack
a method for breaking encryption by trying all possible encryption keys
cryptography
using techniques to obscure a message so outsiders cannot read the message
decryption
the process of converting the encrypted data back into its original, readable form using the appropriate decryption key
digital signatures
created by applying a mathematical algorithm to the data using the sender’s private key
encryption
the process of converting plain text or data into an encoded format that can only be read by authorized parties who possess the appropriate decryption key
key pairs
consist of a public key and a private key
modulus
another name for the remainder after division
public key cryptography
a method of securing digital communication by using two mathematically related keys: a public key and a private key
RSA
distributing a public encryption key, which anyone can use to encrypt messages to you, but which can only be decrypted using a separate private key
substitution cipher
a method of encryption that involves replacing each letter in a message with a different letter or symbol according to a predetermined pattern or rule
transposition cipher
where the order of characters are changed to obscure the message
Key Equations
modular exponentiation rule
[latex]\left(a^{b} \bmod n\right)=(a \bmod n)^{b} \bmod n[/latex]
modular exponent power rule
[latex]\left(a^{b} \bmod n\right)^{c} \bmod n=\left(a^{b c} \bmod n\right)=\left(a^{c} \bmod n\right)^{b} \bmod n \nonumber[/latex]