View on GitHub

reading-notes

My learning journal for Code Fellows

Cryptography

Encryption, Decryption, and Hacking

Encrypting a message

Cryptography is used in computers to keep information secure and to keep packages able to be sent with some amount of privacy on the internet. There is a tradeoff to all secure communication though, and that tradeoff is time. While it is possible to make every interaction online wildly secure, the process of encrypting and decrytping a message gets longer and shorter based on how complex those processes are.

Key Exchange

Key exchange is a type of encryption and allows servers to send information through the internet to a website more securely than it would if it it would use no kind of encryption. Specifically, the Diffie-Hellman key exchange uses modular exponents form of encryption. It uses a combination of public and private values to encrypt.

Public values: Exponent base, modulus Private values: exponents

By sending the public values between user and server, and then combining the exponents together on each respective machine, the resulting huge secret value would be only known to the two parties on either end of the transaction. This style of encryption where the key for decryption is the same at either end is known as symmetric encryption.

Asymmetric encryption is the method where there is a public key that allows anyone to encrypt a message, but the decrypting key is private.