Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    Online age checks came first — a VPN crackdown could be next

    Online age checks came first — a VPN crackdown could be next

    March 22, 2026
    Halide co-founder is suing former partner Sebastiaan de With for taking source code to Apple

    Halide co-founder is suing former partner Sebastiaan de With for taking source code to Apple

    March 21, 2026
    The AirPods Pro 3 are  off right now, nearly matching their best-ever price

    The AirPods Pro 3 are $50 off right now, nearly matching their best-ever price

    March 21, 2026
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » The Simple Math Behind Public Key Cryptography
    Security

    The Simple Math Behind Public Key Cryptography

    News RoomBy News RoomDecember 17, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    The Simple Math Behind Public Key Cryptography

    The original version of this story appeared in Quanta Magazine.

    For thousands of years, if you wanted to send a secret message, there was basically one way to do it. You’d scramble the message using a special rule, known only to you and your intended audience. This rule acted like the key to a lock. If you had the key, you could unscramble the message; otherwise, you’d need to pick the lock. Some locks are so effective they can never be picked, even with infinite time and resources. But even those schemes suffer from the same Achilles’ heel that plagues all such encryption systems: How do you get that key into the right hands while keeping it out of the wrong ones?

    The counterintuitive solution, known as public key cryptography, relies not on keeping a key secret but rather on making it widely available. The trick is to also use a second key that you never share with anyone, even the person you’re communicating with. It’s only by using this combination of two keys—one public, one private—that someone can both scramble and unscramble a message.

    To understand how this works, it’s easier to think of the “keys” not as objects that fit into a lock, but as two complementary ingredients in an invisible ink. The first ingredient makes messages disappear, and the second makes them reappear. If a spy named Boris wants to send his counterpart Natasha a secret message, he writes a message and then uses the first ingredient to render it invisible on the page. (This is easy for him to do: Natasha has published an easy and well-known formula for disappearing ink.) When Natasha receives the paper in the mail, she applies the second ingredient that makes Boris’ message reappear.

    In this scheme, anyone can make messages invisible, but only Natasha can make them visible again. And because she never shares the formula for the second ingredient with anyone—not even Boris—she can be sure the message hasn’t been deciphered along the way. When Boris wants to receive secret messages, he simply adopts the same procedure: He publishes an easy recipe for making messages disappear (that Natasha or anyone else can use), while keeping another one just for himself that makes them reappear.

    In public key cryptography, the “public” and “private” keys work just like the first and second ingredients in this special invisible ink: One encrypts messages, the other decrypts them. But instead of using chemicals, public key cryptography uses mathematical puzzles called trapdoor functions. These functions are easy to compute in one direction and extremely difficult to reverse. But they also contain “trapdoors,” pieces of information that, if known, make the functions trivially easy to compute in both directions.

    One common trapdoor function involves multiplying two large prime numbers, an easy operation to perform. But reversing it—that is, starting with the product and finding each prime factor—is computationally impractical. To make a public key, start with two large prime numbers. These are your trapdoors. Multiply the two numbers together, then perform some additional mathematical operations. This public key can now encrypt messages. To decrypt them, you’ll need the corresponding private key, which contains the prime factors—the necessary trapdoors. With those numbers, it’s easy to decrypt the message. Keep those two prime factors secret, and the message will stay secret.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleThe Best Humidifiers for Home and Away
    Next Article The Honda Prelude returns as a sporty hybrid with a new drive mode

    Related Posts

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    December 6, 2025
    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    December 5, 2025
    Your Data Might Determine How Much You Pay for Eggs

    Your Data Might Determine How Much You Pay for Eggs

    December 4, 2025
    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    December 4, 2025
    This Hacker Conference Installed a Literal Antivirus Monitoring System

    This Hacker Conference Installed a Literal Antivirus Monitoring System

    December 4, 2025
    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    December 4, 2025
    Our Picks
    Halide co-founder is suing former partner Sebastiaan de With for taking source code to Apple

    Halide co-founder is suing former partner Sebastiaan de With for taking source code to Apple

    March 21, 2026
    The AirPods Pro 3 are  off right now, nearly matching their best-ever price

    The AirPods Pro 3 are $50 off right now, nearly matching their best-ever price

    March 21, 2026
    Here are 20 of our favorite outdoor deals from REI’s Member Days Sale

    Here are 20 of our favorite outdoor deals from REI’s Member Days Sale

    March 21, 2026
    An early contender for movie of the year

    An early contender for movie of the year

    March 21, 2026
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    The new MacBook Pro is still fast as hell Reviews

    The new MacBook Pro is still fast as hell

    By News RoomMarch 21, 2026

    Apple’s flagship 16-inch MacBook Pro has reigned supreme in the world of creator-focused laptops since…

    Dreame’s self-cleaning L10s Pro Ultra is nearly ,000 off its original list price

    Dreame’s self-cleaning L10s Pro Ultra is nearly $1,000 off its original list price

    March 21, 2026
    Gemini task automation is slow, clunky, and super impressive

    Gemini task automation is slow, clunky, and super impressive

    March 21, 2026
    The improved battery-powered Starlink Mini is here

    The improved battery-powered Starlink Mini is here

    March 21, 2026
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2026 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.