Asymmetric Encryption: Overview & Techniques

  • Context: Comp Sci 
  • Thread starter Thread starter Krushnaraj Pandya
  • Start date Start date
  • Tags Tags
    Encryption
Click For Summary

Discussion Overview

The discussion revolves around asymmetric encryption, specifically focusing on the RSA algorithm. Participants are exploring the complexity of demonstrating RSA encryption and the challenges associated with understanding its components, such as one-way functions and modular multiplicative inverses.

Discussion Character

  • Exploratory, Technical explanation, Conceptual clarification

Main Points Raised

  • One participant expresses difficulty in demonstrating asymmetric encryption due to the perceived complexity of the one-way functions used in RSA.
  • Another participant counters that the RSA algorithm is simple and references an example from Wikipedia, suggesting it could be used for demonstration.
  • A third participant acknowledges their initial fear regarding the complexity of modular multiplicative inverses but expresses a willingness to learn more about the algorithm.

Areas of Agreement / Disagreement

Participants do not reach a consensus on the complexity of the RSA algorithm; some find it simple while others struggle with its components. The discussion remains unresolved regarding the best approach to demonstrate asymmetric encryption.

Krushnaraj Pandya
Gold Member
Messages
697
Reaction score
73
Homework Statement
With a project I'm trying to demonstrate the key distribution problem on top of an Enigma machine encryption (I'm thinking about naming the project 'Enigmatic Encryption'). For that I'm trying to demonstrate asymmetric encryption, now it seems to me that the 'one-way' functions used in RSA encryption are too complex for me to demonstrate that. So I was thinking I'd have something like a quintic polynomial which takes in a value of x then goes through g(x)=x^5-x+1 and produces an encrypted message- which is sent to the person who has the inverse of this function (and the only person to know the inverse function since he's the only person who knows of g(x) in the first place) and gets back the original x by plugging in the encrypted x through the inverse.

I'm having two issues with this-

1) how would the function g(x) be hidden for the person who has the original message and wants to encrypt it? A key feature of asymmetric encryption is that even the person who encrypted the message can't decrypt it and so it becomes necessary that this function is hidden but can still be used- something like a magical vending machine where you put in something and get something out but have no idea how it works.

2) Another major problem seems to be that quintic functions don't have inverses which makes it impossible to reverse the encryption. Ideally I want a way so that, say, Joe has a function (in a sense his public key) and the inverse of a function (his private key) and he can distribute his public key for use without allowing people to know what the function is (so they can't find its inverse) but can still use that function. Do you know of any good functions I could use, which have an inverse and can be used in this sense.
Relevant Equations
NA
Outlined above
 
Physics news on Phys.org
Krushnaraj Pandya said:
For that I'm trying to demonstrate asymmetric encryption, now it seems to me that the 'one-way' functions used in RSA encryption are too complex for me to demonstrate that.
No, the RSA algorithm is remarkably simple, see this example on Wikipedia, so why not just use that?
 
  • Like
Likes   Reactions: Krushnaraj Pandya
pbuk said:
No, the RSA algorithm is remarkably simple, see this example on Wikipedia, so why not just use that?
I was looking at the algorithm at earlier but got scared looking at modular multiplicative inverses; I still can't fully wrap my head around it but I'll try to learn more about it since you suggest that it's simple enough. Thank you very much.
 
+
 

Similar threads

  • · Replies 7 ·
Replies
7
Views
2K
  • · Replies 2 ·
Replies
2
Views
1K
  • · Replies 2 ·
Replies
2
Views
2K
  • · Replies 17 ·
Replies
17
Views
851
  • · Replies 3 ·
Replies
3
Views
1K
  • · Replies 6 ·
Replies
6
Views
2K
Replies
4
Views
2K
  • · Replies 17 ·
Replies
17
Views
3K
  • · Replies 3 ·
Replies
3
Views
2K
  • · Replies 1 ·
Replies
1
Views
2K