— Ch. 1 · Foundations And Mechanics —
Public-key cryptography.
~4 min read · Ch. 1 of 6
An unpredictable number, typically large and random, begins the generation of an acceptable pair of keys for any asymmetric key algorithm. This mathematical process relies on one-way functions to create security. A public key can be distributed openly without compromising safety. The corresponding private key must remain secret from all other parties. If a private key becomes known to anyone else, the entire system's security fails. Anyone with the public key can encrypt a message or verify a signature. Only the holder of the paired private key can decrypt such messages or generate valid signatures. For example, Alice signs a message with her private key. Bob uses Alice's public key to verify that she sent it and that no modifications occurred during transmission.
Classified British Discoveries
James H. Ellis conceived non-secret encryption in 1970 while working at the UK Government Communications Headquarters. He could see no way to implement his idea at that time. Clifford Cocks implemented what is now known as RSA encryption in 1973. Malcolm J. Williamson developed the Diffie-Hellman key exchange scheme in 1974. These discoveries were passed to the US National Security Agency but remained unrealized due to limited computing power. The British government did not publicly acknowledge these research findings until 1997. Ralph Benjamin stated that these discoveries were declassified only after decades of secrecy. This classified history runs parallel to independent public developments occurring elsewhere.