When we log in to some internet services. We see the famous screen, and there are two lines. The upper line is the normal login. Where we write things like Email or username. That username is called a public key. The fact is that the username is also non-public. That means that is hidden from other users.
Below that line is the space for the password. That is called a "hidden" or non-public key. In that kind of encryption. The user first logs in to the system using the public key. That tells the system that the user has the right to use the system.
Then the passphrase is the key to the step in the system. This is the key procedure in modern cryptology or encryption process. When the system wants to encrypt information. The system first sends the information who is the sender. Then that system encrypts data and sends it to the receiver. And if the receiver has the right key, that thing allows the receiver to open the message.
Encryption allows the receiving system to select the information that it uses. That thing makes it possible to transmit information by using the same frequency to multiple receivers. And without that public key. The system cannot find the right receiver from the network. In the network, routers and switches use the public ID to route the message to the right address.
In the RSA encryption process. The system uses long binary- and quantum binary decimal numbers to secure information. The thing that secures information is the selected binary numbers. The formulas that the system uses are always the same. There can be different formulas or calculation series in the encryption process. But the process itself is similar all the time.
The weakness of that encryption is this. The receiving system must know the formula and binary numbers that the transmitting system sends. The public key requires that the receiver knows what algorithm or formula it must use in the decryption process. And then another thing is that the receiving system must know the binary numbers. That transmitter is used in encryption.
And why do those systems require binary numbers? It's possible to divide The binary number by using only that number itself. That denies the ability to use other numbers. Then the binary number itself opens the message. The problem is that the user must set the right and the same binary numbers to the transmitting and binary systems.
The encryption process is based on the ASCII codes. The encryption system multiplicates and divisions those codes by using binary numbers. The system can make multiple divisions and multiplications. The receiving system must make those calculations backward so that it can open the message. The math behind the encryption is very simple.
It contains divisions, multiplications, and maybe plus-minus calculations. That makes it very simple and effective. The problem is that this type of encryption is old-fashioned. That encryption was made in the late 70's and the short algorithms are a piece of cake for the fast, high-speed supercomputers. Quantum computers can make the code braking in seconds, even if the binary computers generate those numbers for years.
Comments
Post a Comment