In Part I, Introduction to Cryptography. Why It Was Useful to Us Even 4000 Years, we discussed what cryptography is, why it is valuable, and how it evolved over time to the point of being the foundation of our modern world. We now look at what this field has achieved today and what potential challenges it may face in the coming decades.
There are three main methods of cryptography. All of them are widely used today, and it is important to know about them.
An encryption is symmetric if it uses the same key to both encrypt and decrypt a message. On the plus side, you only need to take care of passing the key, so there is just one point of failure. Of the minuses — if the key is compromised, then all previous and subsequent messages will be easily read.
How it works in practice:
Modern desktop computer that has a CPU with a clock speed of 8 GHz is capable of doing around 8 billion operations per second. That means that it would take 35184 seconds to find our key through sheer brute force. Less than 10 hours! And truly powerful computers can do it in mere minutes. This is why each extra letter in the password is crucial. For example, if our key contained 8 letters, it would now take a regular PC 640 hours to break it. More than 26 days!
As we can see, the weak part of symmetric encryption is the key. Its loss becomes the end of everything. You also need to find a way to safely deliver it to the addressee (of course, when the addressee is yourself, you just need to remember it). But there are also advantages to symmetric encryption that keep it ubiquitous today: its speed, clarity, and simplicity. It is well suited to transport or store large amounts of data more securely. For example, it is popular in cloud computing or when encrypting audio and video streams.
Asymmetric encryption is a relatively new invention, it’s less than 50 years old. Two keys are used here, public and private. They are connected to each other in a special way, and the secret is known only to the person or organization that created those keys (they are always created in pairs).
In practice it works like this:
The secret here is that the message can only be decoded with the private key. Even the sender himself will not be able to decrypt it. Although, of course, it will be much easier for him to find a solution, given that he has a clue — the message itself.
Because the private key is never shared, information can only be compromised if all three of these conditions are met:
In general, an asymmetric encryption is much more secure than a symmetrical one (which is broken just by intercepting the key). It was first developed by Berkeley scientists in 1976. Today, it is ubiquitous on the Internet — for example, in HTTPS. It is used by most Web2 organizations and all Web3 platforms. Cryptocurrencies are all built on this method: only the owner of the corresponding private key can access a Bitcoin or Ethereum wallet.
By the way, with asymmetric encryption, it is quite easy to establish a secure communication channel in both directions. Each of the interlocutors can create their own pair of public and private keys, and then send the public key to their friend. Easy!
The third type of encryption, one in which the original data can no longer be restored. With the help of hash functions, for example, transaction numbers and addresses of crypto wallets are created. The peculiarity of these functions is that they can take a long array of data, break it into individual bits and bytes, and convert it into a string of any desired length.
This text string, although it will consist of regular letters and numbers, will usually be many times shorter than the original data array. But if you change at least one character in the original data, the hash string will also change.
No key is used in this data transformation. And it is impossible to restore the original data from the hash. But hashing is very useful because:
Competent organizations also store all your passwords in the form of hashes. It will be impossible to decrypt your password from the hash code, but by doing the same transformation every time user enters their data, they can compare the resulting hash with the original hash and understand whether you entered the same password or not. Actually, it is for this reason that Internet services cannot recover your passwords, instead each time offering you to come up with a new one. They don’t store and don’t know your exact password either.
Encryption algorithms are mathematical methods that allow data to be transformed in such a way that it remains valuable to owners, but becomes useless to thieves. There are, without exaggeration, hundreds of thousands of data conversion methods, some of them — secrets of states or large organizations. Here we will describe only a few public algorithms without any patent and intellectual property rights.
Cryptography as a science field is relatively new, but it already has some unsolved issues. To date, experts identify at least 4 of them. These include:
The unreliability of the encryption foundation. Within the framework of the theory of computational complexity, the connection between different computationally complex problems and their analogues has been proven. This means that if a method of breaking one cryptosystem is found, many others are also at risk, since their background has the same or very similar basis.
Some problems of existing cryptography methods can be solved by the so-called quantum cryptography. It is a relatively new area of research that uses the effects of quantum physics to create even more secure data transmission channels. Quantum cryptography uses a fundamental feature of quantum systems: the fundamental impossibility of accurately determining their state (after all, a cat can be both dead and alive at the same time, remember).
So far, a number of technical difficulties have arisen on the way to the practical implementation of quantum communication systems. But if quantum computers do become more available, perhaps we will have a new round of cryptography evolution, which will bring this science to an even more advanced level. Already, several firms are offering first commercial systems for quantum cryptography, and it could soon prove very relevant for securing critical communication channels or multi-billion dollar transactions.
—-Polkapad is a launchpad for crypto startups that helps connect founders and investors. We are your key to the hottest IDO projects. Join our community if you want to invest in crypto projects for awesome returns or if you want to successfully launch your own crypto product through a crowdsale.
Learn basics in our free Wiki section!