The Unbreakable Cipher

The One Time Pad

In Theory: perfect

In Practice: too many problems
 
 
 
 

Problem: How do two people who have not communicated before start sending encrypted messages?

Answer: Public Key Cryptography



 
 



Public Key Cryptography



 
 

Whitfield Diffie Martin E. Hellman

"New Directions in Cryptography"

IEEE Transactions on Information Theory, November 1976.

WHITFIELD DIFFIE

http://www.wired.com/wired/archive//3.33/diffie.html?person=whitfield_diffie&topic_set=wiredpeople
 



Each person has a public key E and a private key D.

These have the three properties:

    Each undoes the other

    Each is efficient to apply

    Knowledge of E gives no useful knowledge of D.
 
 

Suppose Alice wants to send a message to Bob

Call the message M.

Alice looks ups Bob's public key EB and computes the encrypted message

EB(M) which she sends to Bob.

Bob then applies the private decryption key DB to

obtain

DB ( EB(M ) ) = M

Bob is the only person who knows DBso he is the only person who can decrypt this message.
 
 

Authentication

How does Bob know the message really came from Alice? How could he prove in court that Alice sent it?

In addition to the message M, Alice signs it with her signature S to which she first applies her secret decryption key,

She sends Bob DA(S)

He looks up the public EA and applies it to obtain

EA (DA(S ) ) = S

So Public-Key Crypography solves many problems of Privacy and Authentication and provides an easy way for two people to begin commnicating.

The only question is: How do we find a pair of functions E and D which fit the criteria?

Part 4