Cryptography and Code Breaking Cryptography is the study and practice of hiding messages.
Places Cryptography is Used
Austria in the 1990's A series of letter bombs were sent to various recipients. The list of recipients was encrypted by the terrorists. The terrorists wanted to demonstrate that the government was powerless to stop them.
Cryptographic Methods There are two common types of cryptography. Private Key Cryptography Public Key Cryptography
Private Key Cryptography Using Private Key Cryptography you have to exchange keys prior to communication. The Key must be kept private from third parties.
Public Key Cryptography Using Public Key Cryptography you don't have to exchange keys prior to communicating. Two keys are used with this method, a public key and a personal key.
Personal Key The personal key is two randomly chosen prime numbers. Example: P = 7, Q = 11 This key is not shared with anyone. It is used by the receiver to decrypt the message.
Public Key The public key is the product of the two chosen primes from the personal key. Example: N = P * Q = 7 * 11 = 77 This key is shared with everyone. It is used to encrypt messages to be sent to the person with the matching personal key.
Factorization The strength lies in the difficulty of factoring numbers. What are the factors of 77? 7 and 11 What are the factors of ? 8867 and 7901
Example Keys Here is an example of a small public key that could be used to encrypt a message Can you tell the factors?
Factors Using our method you would find that the factors are: and
My Team Studied Factorization If you can factor the public key you can decipher the message. We devised what we thought was a new technique to factor numbers. We discovered that this technique already existed (fermat factorization).
Applications of Research The mail bombers accidently used a weak key. This allowed the encryption to be broken. The technique used to break the message was the same technique my team reinvented, fermat factorization.
Take Away Messages Cryptography is used everywhere! Cryptography is not always secure. More researchers are needed.