Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

I Joined Every Class Action Lawsuit I Could Find, and So Can You

9 June 2025

Poco F7 India Launch Teased; to Be Available for Purchase Via Flipkart

9 June 2025

Spiritfarer Developer Thunder Lotus Reveals At Fate’s End, An Action Game With Dialogue-Driven Combat

9 June 2025
Facebook X (Twitter) Instagram
Just In
  • I Joined Every Class Action Lawsuit I Could Find, and So Can You
  • Poco F7 India Launch Teased; to Be Available for Purchase Via Flipkart
  • Spiritfarer Developer Thunder Lotus Reveals At Fate’s End, An Action Game With Dialogue-Driven Combat
  • Vivo Y400 Pro 5G May Launch in India Soon; Colour Variants, RAM and Storage Options Tipped
  • Double Fine’s Keeper Is About A Sentient Lighthouse
  • Invincible VS Is A 3v3 Fighting Game Based On The Popular Series
  • Samsung Galaxy Z Fold 7, Z Flip 7 Unpacked Event Tipped to Be Held Mid-July
  • Planet of Lana II: Children of the Leaf Is An Emotional Puzzle Platformer Out In 2026
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » The Simple Math Behind Public Key Cryptography
News

The Simple Math Behind Public Key Cryptography

News RoomBy News Room15 December 20243 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

The original version of this story appeared in Quanta Magazine.

For thousands of years, if you wanted to send a secret message, there was basically one way to do it. You’d scramble the message using a special rule, known only to you and your intended audience. This rule acted like the key to a lock. If you had the key, you could unscramble the message; otherwise, you’d need to pick the lock. Some locks are so effective they can never be picked, even with infinite time and resources. But even those schemes suffer from the same Achilles’ heel that plagues all such encryption systems: How do you get that key into the right hands while keeping it out of the wrong ones?

The counterintuitive solution, known as public key cryptography, relies not on keeping a key secret but rather on making it widely available. The trick is to also use a second key that you never share with anyone, even the person you’re communicating with. It’s only by using this combination of two keys—one public, one private—that someone can both scramble and unscramble a message.

To understand how this works, it’s easier to think of the “keys” not as objects that fit into a lock, but as two complementary ingredients in an invisible ink. The first ingredient makes messages disappear, and the second makes them reappear. If a spy named Boris wants to send his counterpart Natasha a secret message, he writes a message and then uses the first ingredient to render it invisible on the page. (This is easy for him to do: Natasha has published an easy and well-known formula for disappearing ink.) When Natasha receives the paper in the mail, she applies the second ingredient that makes Boris’ message reappear.

In this scheme, anyone can make messages invisible, but only Natasha can make them visible again. And because she never shares the formula for the second ingredient with anyone—not even Boris—she can be sure the message hasn’t been deciphered along the way. When Boris wants to receive secret messages, he simply adopts the same procedure: He publishes an easy recipe for making messages disappear (that Natasha or anyone else can use), while keeping another one just for himself that makes them reappear.

In public key cryptography, the “public” and “private” keys work just like the first and second ingredients in this special invisible ink: One encrypts messages, the other decrypts them. But instead of using chemicals, public key cryptography uses mathematical puzzles called trapdoor functions. These functions are easy to compute in one direction and extremely difficult to reverse. But they also contain “trapdoors,” pieces of information that, if known, make the functions trivially easy to compute in both directions.

One common trapdoor function involves multiplying two large prime numbers, an easy operation to perform. But reversing it—that is, starting with the product and finding each prime factor—is computationally impractical. To make a public key, start with two large prime numbers. These are your trapdoors. Multiply the two numbers together, then perform some additional mathematical operations. This public key can now encrypt messages. To decrypt them, you’ll need the corresponding private key, which contains the prime factors—the necessary trapdoors. With those numbers, it’s easy to decrypt the message. Keep those two prime factors secret, and the message will stay secret.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWatch the Yellowstone series finale: release date, time, channel, plot
Next Article I tried the Dexcom Stelo, one of the best mobile gadgets for tracking your glucose

Related Articles

News

I Joined Every Class Action Lawsuit I Could Find, and So Can You

9 June 2025
News

How to Advocate for Trans Rights in Your Community

8 June 2025
News

How to Buy a Bike Helmet

8 June 2025
News

The Best Read-It-Later Apps for Curating Your Longreads

8 June 2025
News

A New Law of Nature Attempts to Explain the Complexity of the Universe

8 June 2025
News

Review: Dell 14 Plus

8 June 2025
Demo
Top Articles

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 202493 Views

5 laptops to buy instead of the M4 MacBook Pro

17 November 202466 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
Gaming

Invincible VS Is A 3v3 Fighting Game Based On The Popular Series

News Room9 June 2025
Phones

Samsung Galaxy Z Fold 7, Z Flip 7 Unpacked Event Tipped to Be Held Mid-July

News Room9 June 2025
Gaming

Planet of Lana II: Children of the Leaf Is An Emotional Puzzle Platformer Out In 2026

News Room9 June 2025
Most Popular

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025123 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 202493 Views
Our Picks

Vivo Y400 Pro 5G May Launch in India Soon; Colour Variants, RAM and Storage Options Tipped

9 June 2025

Double Fine’s Keeper Is About A Sentient Lighthouse

9 June 2025

Invincible VS Is A 3v3 Fighting Game Based On The Popular Series

9 June 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.