Introduction to cyber security: stay safe online (2024)

Before we get into the details of how computers use asymmetric cryptography, it's worth spending some time on a small thought experiment.

Here's Alice, here's Bob. Alice has a valuable document. And Bob has gone to his local locksmith and ordered a very large number of identical padlocks, as well as a single key which can open any of those padlocks. If anyone asks Bob for a padlock, he'll send one of them through the post, but he will never give away his key.

Alice asks Bob for a padlock. When she receives it she places her valuable item into a box, closes it, then uses the padlock to lock the Box. At this point, the contents of the box are secure behind the padlock and Alice can't open the box, because she doesn't have a key. It's perfectly safe for Alice to send the box through the post because no one who gets a hold of it can open it unless they have a key. And the only key is in Bob's possession.

When both receives the box all he needs to do is use his key to open the lock, open the box, and there's the original document that Alice wanted to send him.

The boxes and padlock example should make asymmetric encryption easier to understand. The padlocks, which are given to anyone who wants one, represent the public key. The top secret key that can unlock the padlocks is the private key. We'll show the public key as a coloured key on a white background. The private key will be a white key on a coloured background. Two keys together are called a key pair, and these are normally held inside a computer on what's called a key chain.

Alice and Bob are now going to use asymmetric cryptography to exchange information. Each of them will independently generate a key pair. A public key, and a private key. The keys are generated using a whole combination of information, such as the user's name and their email address. But to ensure that they can't be created by someone else the program usually asks you to input random information, such as typing away on a keyboard, measuring the amount of traffic passing over a network, or waggling the mouse for a while.

Before they can actually use asymmetric cryptography, Alice and Bob must now exchange their public keys. Each of them sends a copy of their public key to the other. These are added to the key chains on their computers. Alice and Bob are now ready to go.

Alice creates the document she wants to send to Bob. She then, using her encryption program and a copy of Bob's public key, encrypts the document from plaintext into ciphertext. The only way it can be decrypted is using the private key held on Bob's computer. So Eve, or anyone else apart from Bob, can't get at this document no matter how hard they try, which means it's perfectly safe for Alice to send this document over the internet to Bob.

Obviously, the ciphertext needs to be turned back into plaintext. Bob also has a copy of the encryption software. So when he receives the ciphertext the program uses his private key to decrypt the document. Again, this takes a few seconds, but then he's got plaintext. Remember, he's the only person in the world with a copy of his private key, so he's the only one that can actually decrypt this document.

When Bob wants to send a message to Alice he uses his copy of her public key to encrypt the message. Alice uses her securely-stored private key to perform the decryption.

We've seen how asymmetric encryption is used in everyday practice. Now let's look at why it's secure. Remember, asymmetric cryptography uses two different keys – one to encrypt, another to decrypt.

Bob will give his public key to anyone who asks for it, but he always keeps his private key safe and secure. Alice has encrypted a document using Bob's public key and sent it to him over the internet. However, it's been intercepted by Eve, who not only has a copy of the ciphertext, but also a copy of Bob's public key. If Eve tries to decrypt the document using Bob's public key, she's in for a nasty surprise. Eve loads the ciphertext into her encryption program and then uses her copy of the public key to try and decipher it. She ends up with rubbish.

Remember, the document was encrypted with Bob's public key. It can only be decrypted with Bob's private key. And that safe and secure on his computer. No matter how hard Eve tries, she cannot decrypt this document using the public key. She will either have to steal Bob's private key, which is hopefully very secure, or she'll have to use brute force, which could take billions of years to find the correct key. The document is very, very secure.

Introduction to cyber security: stay safe online (2024)
Top Articles
The Mega Guide To Crowdfunded Investments: Equity, Real Estate, And More
Buy-Side vs Sell-Side Analysts | Finance Strategists
Antisis City/Antisis City Gym
Northern Counties Soccer Association Nj
Windcrest Little League Baseball
The Idol - watch tv show streaming online
Mail Healthcare Uiowa
Ribbit Woodbine
WK Kellogg Co (KLG) Dividends
Bill Devane Obituary
Matthew Rotuno Johnson
litter - tłumaczenie słowa – słownik angielsko-polski Ling.pl
Ree Marie Centerfold
Eka Vore Portal
Tcu Jaggaer
Truth Of God Schedule 2023
Craiglist Tulsa Ok
Diamond Piers Menards
Vistatech Quadcopter Drone With Camera Reviews
Army Oubs
Labby Memorial Funeral Homes Leesville Obituaries
If you bought Canned or Pouched Tuna between June 1, 2011 and July 1, 2015, you may qualify to get cash from class action settlements totaling $152.2 million
Woodmont Place At Palmer Resident Portal
Panola County Busted Newspaper
Timeline of the September 11 Attacks
Rek Funerals
Craigslist Rome Ny
Restaurants In Shelby Montana
Angel Haynes Dropbox
Movies - EPIC Theatres
Delete Verizon Cloud
Warren County Skyward
Aladtec Login Denver Health
Composite Function Calculator + Online Solver With Free Steps
Amici Pizza Los Alamitos
Bimmerpost version for Porsche forum?
D3 Boards
Greater Keene Men's Softball
How much does Painttool SAI costs?
Let's co-sleep on it: How I became the mom I swore I'd never be
Gt500 Forums
Lima Crime Stoppers
Pike County Buy Sale And Trade
Blow Dry Bar Boynton Beach
844 386 9815
Gw2 Support Specter
Sandra Sancc
Wolf Of Wallstreet 123 Movies
Xre 00251
Dayton Overdrive
Lightfoot 247
Read Love in Orbit - Chapter 2 - Page 974 | MangaBuddy
Latest Posts
Article information

Author: Prof. An Powlowski

Last Updated:

Views: 6183

Rating: 4.3 / 5 (64 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Prof. An Powlowski

Birthday: 1992-09-29

Address: Apt. 994 8891 Orval Hill, Brittnyburgh, AZ 41023-0398

Phone: +26417467956738

Job: District Marketing Strategist

Hobby: Embroidery, Bodybuilding, Motor sports, Amateur radio, Wood carving, Whittling, Air sports

Introduction: My name is Prof. An Powlowski, I am a charming, helpful, attractive, good, graceful, thoughtful, vast person who loves writing and wants to share my knowledge and understanding with you.