1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Mathematical basis of RSA algorithm

Discussion in 'Security and Privacy' started by psaulm119, 2013/06/03.

  1. 2013/06/03
    psaulm119 Lifetime Subscription

    psaulm119 Geek Member Thread Starter

    Joined:
    2003/12/07
    Messages:
    1,424
    Likes Received:
    21
    Here is a fascinating article on the mathematics behind encrypting signals online:

    Prime Numbers Hide Your Secrets

    I honestly had no idea that this was all mathematics.

    Hopefully others with a lot more security information can comment on this. Is this article on target here? Is this pretty much how every encryption system (like WEP, WPA) works?
     
  2. 2013/06/04
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,072
    Likes Received:
    400
    The article is accurate.

    However, RSA is not used for wireless encryption. RSA is used at a separate level or layer. There are multiple layers of security.

    Connect to wlan and you are entering one layer. Open a browser and connect to your bank and you enter another layer (https).

    Take WEP or WPA. At this layer, the encryption is not using RSA at all. The matching keys exist at both ends, on your computer and on the access point, both stored as a string of characters which are matched to each other when connecting to the access point. The transmission of the keys can use different protocols, e.g. AES, TKIP or others. These protocols "secure" the transmission by using other mathematical formulas which "mix up the key's characters" when being sent, i.e. 12345 != 13254. In WEP, one of the characters is sent in plain text within the beginning of every packet that gets transmitted. Thus, cracking WEP becomes relatively easy: gather enough packets > extract a key's character > assemble varying combinations of key characters until get a match. Takes a few minutes using software with that purpose.

    RSA is used in Secure Socket Layers, SSL (https). You have a security certificate from the secure site installed on your computer, the site has a "master" certificate as described in that article.
     

  3. to hide this advert.

  4. 2013/06/04
    psaulm119 Lifetime Subscription

    psaulm119 Geek Member Thread Starter

    Joined:
    2003/12/07
    Messages:
    1,424
    Likes Received:
    21
    Fascinating. I had no idea that mathematics was behind all this encryption. I always thought it was some digital form of "tear a message in half and then match the halves," although perhaps the math is simply used to make the process of forging or creating that matching half, too time-consuming.

    Thanks for the confirmation. It was from Slate, so I really wasn't sure how qualified they were to explain tech stuff. As it is, the guy who wrote it is a UC Berkeley prof of mathematics.
     
  5. 2013/06/11
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,072
    Likes Received:
    400
    Math is pretty much behind everything done on the Internet, including the Internet itself, and on computers too. All communication is factored down to 0s and 1s. All electronic particles flow at (0s and 1s)'s regulations & directions; that includes keystrokes, mouse movements, RAM use, CPU lanes, TCP/IP, USB; all of it. In actuality, text and multimedia content on screens are an illusion generated using math. Those bouncing boobies in videos are not real in more ways than one!
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.