Skip to main content

There is quite simple math behind the two-stage encryption.



When we log in to some internet services. We see the famous screen, and there are two lines. The upper line is the normal login. Where we write things like Email or username. That username is called a public key.  The fact is that the username is also non-public. That means that is hidden from other users.  

Below that line is the space for the password.  That is called a "hidden" or non-public key. In that kind of encryption. The user first logs in to the system using the public key. That tells the system that the user has the right to use the system. 

Then the passphrase is the key to the step in the system. This is the key procedure in modern cryptology or encryption process. When the system wants to encrypt information. The system first sends the information who is the sender. Then that system encrypts data and sends it to the receiver. And if the receiver has the right key, that thing allows the receiver to open the message. 

Encryption allows the receiving system to select the information that it uses. That thing makes it possible to transmit information by using the same frequency to multiple receivers. And without that public key. The system cannot find the right receiver from the network. In the network, routers and switches use the public ID to route the message to the right address.

In the RSA encryption process. The system uses long binary- and quantum binary decimal numbers to secure information. The thing that secures information is the selected binary numbers. The formulas that the system uses are always the same. There can be different formulas or calculation series in the encryption process. But the process itself is similar all the time. 

The weakness of that encryption is this. The receiving system must know the formula and binary numbers that the transmitting system sends. The public key requires that the receiver knows what algorithm or formula it must use in the decryption process. And then another thing is that the receiving system must know the binary numbers. That transmitter is used in encryption.

And why do those systems require binary numbers?  It's possible to divide The binary number by using only that number itself. That denies the ability to use other numbers. Then the binary number itself opens the message. The problem is that the user must set the right and the same binary numbers to the transmitting and binary systems. 

The encryption process is based on the ASCII codes. The encryption system multiplicates and divisions those codes by using binary numbers. The system can make multiple divisions and multiplications. The receiving system must make those calculations backward so that it can open the message. The math behind the encryption is very simple. 

It contains divisions, multiplications, and maybe plus-minus calculations. That makes it very simple and effective. The problem is that this type of encryption is old-fashioned. That encryption was made in the late 70's and the short algorithms are a piece of cake for the fast, high-speed supercomputers. Quantum computers can make the code braking in seconds, even if the binary computers generate those numbers for years. 


Comments

Popular posts from this blog

The hydrogen-burning supernovas are interesting models.

"Researchers discovered a significant magnesium anomaly in a meteorite’s dust particle, challenging current astrophysical models and suggesting new insights into hydrogen-burning supernovas. (Artist’s concept.)Credit: SciTechDaily.com" (ScitechDaily, Rare Dust Particle From Ancient Extraterrestrial Meteorite Challenges Astrophysical Models) If the star is too heavy when its fusion reaction starts, it can detonate just at that moment, when its fusion starts. If the collapsing nebula is heavy enough, it can form a black hole straight from the nebula. But if the nebula's gravity is too heavy to  form  the blue giant or too  small  it can collapse  straight  into a black hole . If  the forming star is a little bit larger than the blue supergiants. It can explode immediately when the fusion starts.    The theory of hydrogen-burning supernovas consists  model  of the giant stars that explode immediately after their fusion starts. When the...

The ancient galaxy mirrors the Milky Way.

"This image shows the galaxy REBELS-25 as seen by the Atacama Large Millimeter/submillimeter Array (ALMA), overlaid on an infrared image of other stars and galaxies. The infrared image was taken by ESO’s Visible and Infrared Survey Telescope for Astronomy (VISTA). In a recent study, researchers found evidence that REBELS-25 is a strongly rotating disc galaxy existing only 700 million years after the Big Bang. This makes it the most distant and earliest known Milky Way-like galaxy found to date. Credit: ALMA (ESO/NAOJ/NRAO)/L. Rowland et al./ESO/J. Dunlop et al. Ack.: CASU, CALET" (ScitechDaily, Astronomers Baffled by Ancient Galaxy That Mirrors Modern Milky Way) Researchers found the youngest Milky Way-type galaxy. The distance to the galaxy is enormous. And the light that comes from that galaxy named REBELS-25 comes from the Universe that is only 700 million years old. The distance to that galaxy is enormous about 236 billion light years. And that means it's a very dista...

Transcendence, or the ability to transcendent thinking may grow in teen's brains.

   "New research has discovered that transcendent thinking, which involves analyzing the broader implications of situations, can foster brain growth in adolescents. This form of thinking enhances brain network coordination, impacting developmental milestones and future life satisfaction. The study emphasizes the need for education that encourages deep, reflective thought, underscoring the critical role of adolescents in their own brain development". (ScitechDaily, Scientists Discover That “Transcendent” Thinking May Grow Teens’ Brains) "Scientists at  USC Rossier School of Education’s Center for Affective Neuroscience, Development, Learning and Education (CANDLE) have discovered that adolescents who grapple with the bigger meaning of social situations experience greater brain growth, which predicts stronger identity development and life satisfaction years later". (ScitechDaily, Scientists Discover That “Transcendent” Thinking May Grow Teens’ Brains) The transcendenc...