Asymmetric Cryptography#

Asymmetric cryptography relies on one-way mathematical functions.


One-Way Functions#

Regular arithmetic is reversible:

  • If $3^x=81$, then $x=log_{3}(81)$.

Modular arithmetic is not:

  • Solving $3^x \mod{7} = 1$ is non-trivial
  • The discrete logarithm problem is hard

Core Idea#

  • Encryption and decryption use different keys
  • Encryption key is public
  • Decryption key is private
  • Eliminates the key distribution problem

Public-Key Concept#

Anyone can encrypt a message using the public key. Only the private key holder can decrypt it.


Historical Development#

  • Diffie–Hellman introduced key exchange
  • Ellis conceptualized public-key cryptography (classified)
  • Cocks derived RSA internally at GCHQ
  • RSA publicly introduced the first practical system

RSA#

  • Based on integer factorization
  • Security relies on computational hardness
  • Initially limited to governments and industry

Hybrid Cryptography#

  • RSA encrypts symmetric keys
  • Symmetric cipher encrypts message
  • Used in systems like PGP

Summary#

Asymmetric cryptography enables secure communication over open channels by exploiting mathematical asymmetry rather than secrecy.