LLMpediaThe first transparent, open encyclopedia generated by LLMs

public-key cryptography

Generated by Llama 3.3-70B
Note: This article was automatically generated by a large language model (LLM) from purely parametric knowledge (no retrieval). It may contain inaccuracies or hallucinations. This encyclopedia is part of a research project currently under review.
Article Genealogy
Parent: William F. Friedman Hop 3
Expansion Funnel Raw 94 → Dedup 30 → NER 27 → Enqueued 20
1. Extracted94
2. After dedup30 (None)
3. After NER27 (None)
Rejected: 3 (not NE: 3)
4. Enqueued20 (None)
Similarity rejected: 2

public-key cryptography is a method of secure communication that uses a pair of keys, one for encryption and another for decryption, as developed by Diffie-Hellman key exchange and Rivest-Shamir-Adleman (RSA) at Stanford University and Massachusetts Institute of Technology (MIT). This approach was first introduced by Whitfield Diffie and Martin Hellman in their 1976 paper, "New Directions in Cryptography," published in the IEEE Transactions on Information Theory, and later expanded upon by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT Laboratory for Computer Science. The concept of public-key cryptography has been instrumental in enabling secure online transactions, as recognized by the National Academy of Engineering and the Association for Computing Machinery (ACM). Public-key cryptography has been widely adopted in various industries, including Google, Amazon Web Services (AWS), and Microsoft Azure, to ensure the confidentiality and integrity of data.

Introduction to Public-Key Cryptography

Public-key cryptography, also known as asymmetric cryptography, is a cryptographic technique that uses a pair of keys, one public and one private, to secure data transmission, as described by Claude Shannon in his work on information theory at Bell Labs. The public key is used for encryption, while the private key is used for decryption, as implemented in OpenSSL and GNU Privacy Guard (GPG). This approach provides a secure way to communicate over an insecure channel, such as the Internet, without the need for a shared secret key, as demonstrated by Philip Zimmermann in his development of Pretty Good Privacy (PGP). Public-key cryptography is widely used in various applications, including Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as used by Mozilla Firefox and Google Chrome.

History of Public-Key Cryptography

The concept of public-key cryptography was first introduced in the 1970s by James Ellis at Government Communications Headquarters (GCHQ) and Clifford Cocks at GCHQ, but it was not until the 1980s that it gained widespread attention, with the work of Ron Rivest and Adi Shamir at MIT and Leonard Adleman at University of Southern California (USC). The development of public-key cryptography was influenced by the work of William Friedman and Elizebeth Friedman in cryptanalysis at National Security Agency (NSA). The first public-key cryptosystem, RSA, was developed in 1978 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT, and it remains one of the most widely used public-key cryptosystems today, as used by PayPal and Amazon Payments.

Principles of Public-Key Cryptography

Public-key cryptography is based on the principles of number theory, particularly the difficulty of factoring large composite numbers, as described by Andrew Odlyzko in his work on number theory at AT&T Bell Labs. The security of public-key cryptography relies on the difficulty of computing discrete logarithms, as studied by Daniel Shanks at University of Maryland. The most commonly used public-key cryptosystems, such as RSA and elliptic curve cryptography (ECC), are based on the difficulty of factoring large composite numbers and computing discrete logarithms, as implemented in OpenSSH and PuTTY. Public-key cryptography also relies on the concept of hash functions, such as SHA-256 and BLAKE2, as used by Bitcoin and Ethereum.

Types of Public-Key Cryptosystems

There are several types of public-key cryptosystems, including RSA, elliptic curve cryptography (ECC), and Diffie-Hellman key exchange, as used by WhatsApp and Signal. Each of these cryptosystems has its own strengths and weaknesses, and they are used in different applications, such as secure email and virtual private networks (VPNs), as implemented by ProtonMail and ExpressVPN. Public-key cryptosystems can be classified into two main categories: key exchange protocols, such as Diffie-Hellman key exchange and New Hope, and encryption schemes, such as RSA and ElGamal encryption, as used by Dropbox and Microsoft OneDrive.

Applications of Public-Key Cryptography

Public-key cryptography has a wide range of applications, including secure web browsing (HTTPS), virtual private networks (VPNs), and secure email, as used by Gmail and Outlook. Public-key cryptography is also used in digital signatures, such as PGP and X.509, as implemented by Apache HTTP Server and Nginx. Additionally, public-key cryptography is used in cryptocurrencies, such as Bitcoin and Ethereum, to secure transactions and control the creation of new units, as recognized by World Economic Forum and International Monetary Fund (IMF). Public-key cryptography is also used in Internet of Things (IoT) devices, such as smart home devices and wearable devices, as developed by Samsung and Apple.

Security Considerations

Public-key cryptography is considered to be a secure method of encryption, but it is not without its vulnerabilities, as studied by Bruce Schneier at Harvard University and Niels Ferguson at Microsoft Research. The security of public-key cryptography relies on the difficulty of factoring large composite numbers and computing discrete logarithms, as described by Arjen Lenstra at École polytechnique fédérale de Lausanne (EPFL). However, with the advent of quantum computing, public-key cryptography may become vulnerable to attacks, as warned by National Institute of Standards and Technology (NIST) and European Union Agency for Network and Information Security (ENISA). To address these concerns, researchers are exploring new public-key cryptosystems, such as lattice-based cryptography and code-based cryptography, as developed by IBM Research and Google Research. Category:Cryptography