{"id":4583,"date":"2023-06-16T02:03:21","date_gmt":"2023-06-16T02:03:21","guid":{"rendered":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/?post_type=chapter&#038;p=4583"},"modified":"2024-10-18T20:53:32","modified_gmt":"2024-10-18T20:53:32","slug":"cryptography-apply-it-2","status":"web-only","type":"chapter","link":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/chapter\/cryptography-apply-it-2\/","title":{"raw":"Cryptography: Apply It 2","rendered":"Cryptography: Apply It 2"},"content":{"raw":"<h2>Cryptographic Chronicles: Embarking on Zuri's Journey to Safeguard Data Cont.<\/h2>\r\nWhile symmetric-key methods like substitution and transposition ciphers can be effective, they have their limitations. One of the biggest issues is the need for a secure method to exchange the key between parties. This is where Zuri's understanding of public key cryptography will come in handy.\r\n<h3>Public key Cryptography<\/h3>\r\nPublic key cryptography involves two keys: a public key, which can be freely distributed and used by anyone to encrypt messages, and a private key, kept secret by the recipient and used to decrypt the messages. This is a simple representation of the system; real-world usage involves complex mathematical operations.\r\n\r\n<section class=\"textbox tryIt\">[ohm2_question hide_question_numbers=1]9539[\/ohm2_question]<\/section>Part of Zuri's new role also involves understanding the processes that ensure message authenticity. One such process is the use of digital signatures.\r\n\r\nIf Alice sends a digitally signed message to Zuri, which key should Zuri use to verify the digital signature and read the message?\r\n\r\n<section class=\"textbox tryIt\">[ohm2_question hide_question_numbers=1]9540[\/ohm2_question]<\/section><section class=\"textbox recall\">Digital signatures are created by the sender encrypting the message with their private key. This means anyone with the sender's public key can decrypt it.<\/section>Public key cryptography is generally more secure than symmetric key methods, but it also has disadvantages.\r\n\r\n<section class=\"textbox tryIt\">[ohm2_question hide_question_numbers=1]9541[\/ohm2_question]<\/section>As Zuri continues to dive deeper into the world of cryptography, she encounters the concept of one-way functions and their importance in secure communication. She'll also explore modular arithmetic, a crucial component of public key cryptography.\r\n<h3>One-way functions and Modular Arithmetic<\/h3>\r\nOne of Zuri's colleagues presents her with a question related to one-way functions, often used in generating cryptographic hashes. He gives her a simple function: [latex]f(x) = x \\text{ mod } 17[\/latex], and asks her to compute [latex]f(89)[\/latex].\r\n\r\n<section class=\"textbox tryIt\">[ohm2_question hide_question_numbers=1]9542[\/ohm2_question]<\/section>Excellent work, you've navigated various forms of cryptographic methods alongside Zuri. You've delved into substitution and transposition ciphers, unpacked public key cyprtography, and grappled with modular arithmetic. This knowledge will be pivotal in your understanding of cybersecurity principles. Keep up the great work!","rendered":"<h2>Cryptographic Chronicles: Embarking on Zuri&#8217;s Journey to Safeguard Data Cont.<\/h2>\n<p>While symmetric-key methods like substitution and transposition ciphers can be effective, they have their limitations. One of the biggest issues is the need for a secure method to exchange the key between parties. This is where Zuri&#8217;s understanding of public key cryptography will come in handy.<\/p>\n<h3>Public key Cryptography<\/h3>\n<p>Public key cryptography involves two keys: a public key, which can be freely distributed and used by anyone to encrypt messages, and a private key, kept secret by the recipient and used to decrypt the messages. This is a simple representation of the system; real-world usage involves complex mathematical operations.<\/p>\n<section class=\"textbox tryIt\"><iframe loading=\"lazy\" id=\"ohm9539\" class=\"resizable\" src=\"https:\/\/ohm.one.lumenlearning.com\/multiembedq.php?id=9539&theme=lumen&iframe_resize_id=ohm9539&source=tnh\" width=\"100%\" height=\"150\"><\/iframe><\/section>\n<p>Part of Zuri&#8217;s new role also involves understanding the processes that ensure message authenticity. One such process is the use of digital signatures.<\/p>\n<p>If Alice sends a digitally signed message to Zuri, which key should Zuri use to verify the digital signature and read the message?<\/p>\n<section class=\"textbox tryIt\"><iframe loading=\"lazy\" id=\"ohm9540\" class=\"resizable\" src=\"https:\/\/ohm.one.lumenlearning.com\/multiembedq.php?id=9540&theme=lumen&iframe_resize_id=ohm9540&source=tnh\" width=\"100%\" height=\"150\"><\/iframe><\/section>\n<section class=\"textbox recall\">Digital signatures are created by the sender encrypting the message with their private key. This means anyone with the sender&#8217;s public key can decrypt it.<\/section>\n<p>Public key cryptography is generally more secure than symmetric key methods, but it also has disadvantages.<\/p>\n<section class=\"textbox tryIt\"><iframe loading=\"lazy\" id=\"ohm9541\" class=\"resizable\" src=\"https:\/\/ohm.one.lumenlearning.com\/multiembedq.php?id=9541&theme=lumen&iframe_resize_id=ohm9541&source=tnh\" width=\"100%\" height=\"150\"><\/iframe><\/section>\n<p>As Zuri continues to dive deeper into the world of cryptography, she encounters the concept of one-way functions and their importance in secure communication. She&#8217;ll also explore modular arithmetic, a crucial component of public key cryptography.<\/p>\n<h3>One-way functions and Modular Arithmetic<\/h3>\n<p>One of Zuri&#8217;s colleagues presents her with a question related to one-way functions, often used in generating cryptographic hashes. He gives her a simple function: [latex]f(x) = x \\text{ mod } 17[\/latex], and asks her to compute [latex]f(89)[\/latex].<\/p>\n<section class=\"textbox tryIt\"><iframe loading=\"lazy\" id=\"ohm9542\" class=\"resizable\" src=\"https:\/\/ohm.one.lumenlearning.com\/multiembedq.php?id=9542&theme=lumen&iframe_resize_id=ohm9542&source=tnh\" width=\"100%\" height=\"150\"><\/iframe><\/section>\n<p>Excellent work, you&#8217;ve navigated various forms of cryptographic methods alongside Zuri. You&#8217;ve delved into substitution and transposition ciphers, unpacked public key cyprtography, and grappled with modular arithmetic. This knowledge will be pivotal in your understanding of cybersecurity principles. Keep up the great work!<\/p>\n","protected":false},"author":23,"menu_order":12,"template":"","meta":{"_candela_citation":"[]","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"part":2245,"module-header":"apply_it","content_attributions":[],"internal_book_links":[],"video_content":null,"cc_video_embed_content":{"cc_scripts":"","media_targets":[]},"try_it_collection":null,"_links":{"self":[{"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/pressbooks\/v2\/chapters\/4583"}],"collection":[{"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/wp\/v2\/users\/23"}],"version-history":[{"count":6,"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/pressbooks\/v2\/chapters\/4583\/revisions"}],"predecessor-version":[{"id":7671,"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/pressbooks\/v2\/chapters\/4583\/revisions\/7671"}],"part":[{"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/pressbooks\/v2\/parts\/2245"}],"metadata":[{"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/pressbooks\/v2\/chapters\/4583\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/wp\/v2\/media?parent=4583"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/pressbooks\/v2\/chapter-type?post=4583"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/wp\/v2\/contributor?post=4583"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/wp\/v2\/license?post=4583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}