Cryptography, private and public-key. A limited aim

Everyone has some rough idea that 'cryptography' is about disguising (encrypting) and recovering (decrypting) secret comminucation. It is used by governments, the military, big business, drugs barons, citizens, ...

(*The* outstanding general history reference is David Kahn's 1181 page The Codebreakers (The Comprehensive History of Secret Communication from Ancient Times to the Internet), published by SCRIBNER , 1996 (2nd. new edition) ISBN 0-684-83130-9. The excellent journal Cryptologia - produced by the US Military Academy - treats the history of cryptography.)

A completely trivial - but nevertheless instructive - example to bear in mind is the so-called Caesar method (evidently used by Julius Caesar): replace the intended text with a disguised text where every letter has been shifted 3 places cyclically in the alphabet. One receipt of the encrypted message one recovers the original message by shifting backwards by 3 letters. Thus zebra encrypts to cheud decrypts to zebra .

Before 1977 one needed to keep the encryption method secret (' private '!) otherwise an 'enemy' who intercepted/eavesdropped the encrypted message could recover the original message.

Then, in 1977, a revolution occured: the theoretical idea of public-key cryptography - proposed by Diffie and Hellman in 1976 (in a nutshell they asked for an encryption method of such a nature that even if one knew how the message had been encrypted, one could not decrypt the intercepted message in a reasonable time: many years) - became a reality within one year, with the work of Rivest, Shamir and Adelman.

I quote from David Kahn's PREFACE [1996] TO THE REVISED EDITION of his The Codebreakers : "The need to revise this book existed even before it was published on September 27, 1967. I had written what I hoped would be the definitive history of the subject. I did not know at the time of such great matters as the Polish-British-American mastery of the German Enigma cipher machine, which had such great effects on World Was II... Nor did I - or anyone else - know of things that had not yet been invented, such as public-key cryptography."

A painting image that I use: Alice and Bob wish to communicate, and do so by using a paint and its related paint remover. Alice writes her message on a sheet, paints it over (encrypts), sends the painted sheet to Bob, who then removes the disguising paint using a coat of paint remover, and reads the underlying message. Clasically, Alice and Bob needed to keep their paints secret (this is the essence of private-key cryptography), in the sense that some ill-minded chemist could manufacture the second of the paints if s/he had access to the other.

In terms of that simple image, what Diffie-Hellman were asking for in 1976 - in terms of Alice and Bob - was this: could one create (and vary from time-to-time) paints publicAlice ('public' in the sense that Alice doesn't care who has access to it) and privateAlice ('private' in the sense that only Alice has access to it; more below) with these two properties:

1. A surface painted with privateAlice (disguising the surface), and subsequently painted over with paint removing publicAlice , restores the original surface (and vice-versa, although I will not pursue that here).

2. No ill-minded chemist can realistically (meaning: in years, say) manufacture privateAlice1 from publicAlice.

Note that in this simplified picture I have ignored the possibility that an ill-minded interceptor could also read Alice's message if s/he had access to Alice's public paint; I am concentrating solely on the verification that Alice is/was the author of the her message (in the 'real world' this requires the use of 'certification authorities'...)

In my 1998 Clinton-Ahern public lecture - with more time on hand - I illustrated how two parties may securely comminucate with each other using public-key cryptography. 'Securely' meaning that Alice and Bob may communicate with each other, knowing with certainty that they are each other, and that no ill-intentioned eaves-dropper may determine the content of their messages in a reasonable time...

Here my more modest aim is to illustrate how one party (Alice) may comminucate with another (Bob), so that Bob may feel certain that the received message really has come from Alice (she using her digital signature ).

(I leave it to you to ponder how Alice and Bob may securely communicate with each other so that both may know with certainty that each is the other, and no ill-intentioned eaves-dropper may determine the content of their messages in a reasonable time... You will find the details in my original, longer Clinton-Ahern talk.)

Contact details 

After August 31st 2007 please use the following Gmail address: jbcosgrave at gmail.com


This page was last updated 18 February 2005 15:08:22 -0000