Security using encryption – Evolution of Private and Public cryptography

Security using encryption – Evolution of Private and Public cryptography

The Public and Private key pair are uniquely related. Such keys are basically long random numbers.

 The Public Key is what its name suggests - Public. It is made available to everyone via a publicly accessible repository or directory. On the other hand, the Private Key is confidential to its owner.

 Let us look at evolution of cryptography

Scenario 1:

The initial solution to send messages securely between two parties (say a browser (A) and a server (B)) was to encrypt the message and send, so that it can be decrypted again by the receiver.

In order to do this, both A and B had to agree on an encryption mechanism. For example one of the simplest and most common is the substitution cipher (Eg: A is substituted with B, B with C, C with D….). As long as B knows this, he can decrypt the message and read it.

Scenario 2:

But how do A and B first agree on the encryption key, without others finding out about it? - this remained a challenge. So was introduced the concept of private/secure key paired with the public key.

Let us say A and B want to exchange message m securely as an encrypted message m’

Nomenclature:

  • Pa = Public Key of A
  • Pb = Public key of B
  • S = Secret Key / Private Key 

A encrypts message using B’s public key

1.      A Pb(m) = m’

So only B can decrypt this message using his secure key.

2.      B S(m’) = m

Scenario 3:

Do you realize an underlying problem with the above methodology? Since B’s public key is public, anyone can use that key to send a message to B. So that will give imposter C and opportunity to pose as A and send a secured message to B. There is no way for B to validate whom the message came from.

To solve this, an additional layer was introduced as below:

A encrypts m using B’s public key to get m’. A then uses his own secure key to get m’’.

Encrypt

1.      A Pb(m) = m’

2.      A S(m’) = m’’

B first uses A’s public key to decode m’’ to get m’. B then uses his secure key on m’ to get the original message m.

Decrypt

3.      B Pa(m’’) = m’

4.      B S(m’) = m

This will ensure that both parties can trust the source of information and also securely exchange the information.

For example, if imposter C had pretended to be A and sent the message, then step 3 above will fail, since B will be trying to decrypt m’’ using A’s public key and it will not work as it is different from C’s public key.

To view or add a comment, sign in

More articles by Abhinav Mahadevan Nagasubramanian

  • Securing your IOT microcontroller board

    This article is in continuation to https://www.linkedin.

  • Security challenges in IoT

    Security in IOT is an area where a lot of research is happening. 1.

  • My experimentation with IoT - Part 2

    This article is in continuation to "https://www.linkedin.

    1 Comment
  • My experimentation with IoT - Part 1

    This is a detailed account of my experimentation with IOT – specifically controlling a fan remotely using a webpage…

  • My experimentation with IoT - An intro

    While my previous article covered IOT more from a business and strategic perspective (https://www.linkedin.

    1 Comment
  • Prospect theory in Project Management

    Let’s take 2 situations with options for you to choose from: a. You will get Rs 1000 for sure tomorrow b.

    1 Comment
  • Earned Value Management in Agile Software Projects

    What is EVM? Earned Value Management (EVM) is a quantitative methodology used in project management to access the…

    1 Comment
  • IoT – Making hype the reality

    IoT is the concept of devices talking to each other via the internet. Though this sounds simplistic, the way IoT…

  • Chatbots and their future

    What are chatbots? A chatbot is basically robots which can chat based on a set of rules and hence provide a channel for…

    2 Comments
  • What does a leader need to succeed?

    A leader is known by his followers. There are certain characteristics of these followers that prevent a leader from…

Others also viewed

Explore content categories