Help me develop a public-key system (for fun)

  • Context: Undergrad 
  • Thread starter Thread starter moonman239
  • Start date Start date
  • Tags Tags
    Fun System
Click For Summary
SUMMARY

This discussion focuses on the development of a public-key encryption system, emphasizing the process of message encryption and decryption between two parties, Alice and Bob. The proposed algorithm involves converting messages into numerical representations, utilizing Alice's public key for sorting, and employing Bob's private key to obfuscate the message against frequency analysis. The conversation highlights the inherent complexity and computational expense of public-key encryption, suggesting that it is typically used to transmit a small private key, followed by less resource-intensive symmetric encryption for larger data transfers.

PREREQUISITES
  • Understanding of public-key encryption principles
  • Familiarity with frequency analysis in cryptography
  • Basic knowledge of numerical representation of characters
  • Awareness of symmetric vs. asymmetric encryption techniques
NEXT STEPS
  • Research the RSA algorithm for public-key encryption
  • Explore methods to implement frequency analysis countermeasures
  • Learn about hybrid encryption systems combining public and symmetric keys
  • Investigate the computational costs associated with various encryption algorithms
USEFUL FOR

Cryptography enthusiasts, software developers interested in secure communication, and anyone looking to understand or implement public-key encryption systems.

moonman239
Messages
276
Reaction score
0
Help me develop a public-key system (for fun) :)

I just read up on public-key encryption and now I'm kind of interested in building an algorithm of my own. How about something like this:

1) Alice could type her message to Bob into a computer

2) The computer converts the letters and characters into numbers.

3) The computer then uses Alice's public key to determine how to sort the digits.

4) The computer then uses Bob's private key to change the message to throw off frequency analysis. For example if 4 appears more frequently than 2, Bob's public key dictates that at least one 4 should be replaced with a number that will now appear more or less frequent than the 4.

5) Alice then sends this message to Bob, whose computer decrypts the message.
 
Mathematics news on Phys.org


In a public-key scheme, you use the receiver's public key to encrypt the message. The receiver uses his private key for decryption.

Simply subbing more letters to throw off frequency analysis will still be susceptible to more advanced attacks, such as this.

Public-key encryption is very expensive, so usually the sender uses it only to send a small private key, and then use less expensive private encryption to send data.

It'll be interesting to see what kind of algorithm you can come up with, though. We need more details!
 

Similar threads

Replies
17
Views
1K
  • · Replies 8 ·
Replies
8
Views
2K
Replies
8
Views
4K
Replies
5
Views
696
  • · Replies 1 ·
Replies
1
Views
2K
Replies
14
Views
3K
  • · Replies 13 ·
Replies
13
Views
5K
  • · Replies 5 ·
Replies
5
Views
3K
Replies
2
Views
3K
  • · Replies 3 ·
Replies
3
Views
4K