0/ What is Public Key Cryptography? ๐Ÿง™โ€โ™‚๏ธโœจ

(0/16) ๐Ÿงต๐Ÿ‘‡
1/ Public key #cryptography is a cryptographic system that uses a pair of keys, a public key and a private key, to secure communication between individuals, entities, or nodes in a network.
2/ The public key is made available to anyone and is used for verification purposes, while the private key is kept secret by the owner and is used to sign messages or transactions within the system.
3/ Through the use of mathematical algorithms, the sender can encrypt a message using the recipient's public key, which can only be decrypted using the recipient's private key. This allows for secure communication without the need for the sender & recipient to share a secret key.
4/ So, in short, public key #cryptography is a way of securely communicating between individuals or nodes in a network using a pair of keys - a public key and a private key.
5/ One of the key benefits of public key cryptography is that it allows for secure communication without the need for the sender and recipient to share a secret key.
6/ This is done through the use of mathematical algorithms that enable the sender to encrypt a message using the recipient's public key, which can only be decrypted using the recipient's private key.
7/ Public key cryptography was first introduced in 1976 by Whitfield Diffie and Martin Hellman in their paper "New Directions in Cryptography."
8/ Since then, it has become a widely used method for secure communication, particularly in computer security.
9/ In 1978, Ron Rivest, Adi Shamir, and Leonard Adleman introduced the RSA algorithm, which is still widely used today as the basis for both an asymmetric cryptographic system and digital signatures.
10/ Digital signatures are an integral part of blockchain networks, which are built on the foundation of public key cryptography. I will explain those in more detail in tomorrow's threads as well.
11/ But first, let's have a look at RSA. To explain the RSA algorithm, let's use the widely adopted "Alice and Bob" framework.
12/ Starting point: Alice wants to encrypt a message and send it to Bob using an RSA-based asymmetric cryptographic system.
13/ Bob calculates all the parameters of the system by selecting two large prime numbers (p and q), calculating the product n = pq, selecting a number e that is relatively prime to (p-1)(q-1), and calculating its inverse d using the Euclidean algorithm.
14/ The private key in this system is d, while the public key is (n, e). Bob communicates the public key (n, e) to Alice, who can then use it to convert the message m into the ciphertext c: c=m^e mod n.
15/ When Bob receives the ciphertext, he can use his private key d to decrypt it: m=c^d modn. And that's a basic overview of how the RSA algorithm works!
16/ I will introduce more cryptographic primitives over the next few days, so stay tuned! ๐Ÿง™โ€โ™‚๏ธโœจ

โ€ข โ€ข โ€ข

Missing some Tweet in this thread? You can try to force a refresh
ใ€€

Keep Current with Zero Knowledge ๐Ÿบโœจ

Zero Knowledge ๐Ÿบโœจ Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @expctchaos

Dec 27
0/ What are Non-Interactive Zero-Knowledge Proofs (NIZKPs)? ๐Ÿง™โ€โ™‚๏ธโœจ

(0/10) ๐Ÿงต๐Ÿ‘‡
1/ First of all, what are zero knowledge proofs (ZKPs) in general?

ZKPs are a #cryptographic technique that allow individuals or entities to prove to another that a statement is true, without revealing any information beyond the validity of the statement.
2/ One variant of ZKPs are non-interactive zero-knowledge proofs (NIZKPs), which don't require interaction between the certifier and verifier.
Read 11 tweets
Dec 27
0/ What is Homomorphic Encryption (HE)? ๐Ÿง™โ€โ™‚๏ธโœจ

(0/10) ๐Ÿงต๐Ÿ‘‡
1/ HE is a cryptographic tool that allows you to perform certain types of computations directly on the homomorphically encrypted ciphertext, generating the same results as if you performed the operations on the plaintext.
2/ There are two types of HE: partially homomorphic encryption (PHE) & fully homomorphic encryption (FHE). PHE allows for a limited number of operations on the ciphertext (e.g. addition or multiplication), while FHE allows for any computation to be performed on the ciphertext.
Read 10 tweets
Dec 27
covering a lot of #cryptography and #privacy stuff lately. Time to revisit some of my older privacy-related threads

find below

- the #privacy bull case

- @SecretNetwork and its TEE infrastructure

- @MantaNetwork and zk-tech

- @DuskFoundation and zk-enabled #RegFi

+++

๐Ÿฅท โœจ
1/ the privacy bull case

$SCRT $MANTA $PHA $DUSK $XHV $MINA

2/ TEE infrastructure on $SCRT network

Read 6 tweets
Dec 27
0/ What are Ring Signatures? ๐Ÿง™โ€โ™‚๏ธโœจ

(0/16) ๐Ÿงต๐Ÿ‘‡
1/ Ring signatures are a privacy technology that aims to keep user's identities private when making (signing) transactions in public #blockchain networks
2/ In ring signature schemes, a group of users, called the "ring," can sign a message anonymously using their personal secret keys.
Read 16 tweets
Dec 26
0/ What are Hash Pointers? ๐Ÿง™โ€โ™‚๏ธโœจ

(0/7) ๐Ÿงต๐Ÿ‘‡
1/ Hash pointers are a type of pointer that point to a specific location in a data structure, specifically a block in a blockchain. They are an essential part of the structure and security of blockchains.
2/ To understand hash pointers, it's helpful to know what pointers are more generally. Pointers are variables that store the address of another variable, allowing you to indirectly access and manipulate the value of a variable by referring to its memory location.
Read 9 tweets
Dec 26
0/ What are Hash Functions? ๐Ÿง™โ€โ™‚๏ธโœจ

(0/12) ๐Ÿงต๐Ÿ‘‡
1/ A hash function is a function that converts data into a fixed-size output, also known as a hash.
2/ Cryptographic hash functions are a type of hash function that are designed to be one-way functions, meaning it is computationally infeasible to find the original input from the hash output.
Read 13 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(