Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
~1~
Table of Contents
Table of Figures............................................................................ 3
The Information Age.....................................................................4
The History of the Internet............................................................4
9 Protecting Data........................................................................5
Founders of Public Key Encryption.................................................5
Data Safety.................................................................................. 6
Locating the Public Key.................................................................7
Usernames and Passwords............................................................7
The Future of Security..................................................................8
Appendix A..................................................................................9
Bibliography............................................................................... 12
Index......................................................................................... 13
~2~
Table of Figures
Table 1: ASCII Codes................................................................................................... 9
Table 2 One Hundred Prime Numbers.......................................................................10
Table 3 The Seive Of Eartosthenes...........................................................................10
~3~
~4~
and 90s, the internet transitioned from a military and research communication tool
to a public communication tool.2
By the mid-1990s, companies were finding ways to market through the internet.
Microsofts Windows 98 provided a source of standardized internet access to a large
number of consumers, both business and individuals. Other software companies
followed suit. E-commerce was going strong, led by companies such as Amazon.
The former military network was now used by a majority of the public in the United
States.3 E-commerce brought the need for sharing private information securely from
a public site. Payment was usually made by credit card, so the number must be
sent through the internet. The use of electronic records, accessible from multiple
locations, has required a secure system which can transfer larger packets of
information securely. These records are used in many fields, including education,
banking and medicine. How are these records protected?
10 Protecting Data
Transferring data is possible because computers handle all information numerically.
The letters of the alphabet are matched to numbers in a code referred to as ASCII.
(See the table in Appendix A.) Each letter and number symbol is represented by a
number. The computer does not use E. It uses 069. For e the computer uses
101. The complete table is in the appendix. Since all data is represented by
numbers, performing calculations on the numbers hides the data. The technique
that is most commonly used for this is called public key encryption.
~5~
In August, 1977, Martin Gardner announced RSA public key encryption in the
Games column of Scientific American. (Gardner) The underlying premise of public
key encryption is that the person receiving the information will choose two large
prime numbers. (Prime numbers are those that can be evenly divided only be itself
4 Singh, Simon. The Code Book. New York: Random House, 1999.
5 Singh, Simon. The Code Book. New York: Random House, 1999.
~6~
and one.) These two prime numbers are the private key. The product of these two
primes, resulting from multiplication of the two prime numbers, is the public key.
Data Safety
Are credit card numbers safe with a basic set of calculations like this? Are medical
records secure? All the hacker would have to do is find one prime number that is a
factor of the public key, and the second number will reveal itself, too. Luckily, it isnt
as easy as that. Martin Gardner, in the article that first announced public key
encryption, challenged his readers to decode a cypher text using a public key of 129
digits that he printed in the article.7 Eighteen years later a group of 600 volunteers
was able to break the encryption by factoring the public key. The group split the job
into parts and used the computers and supercomputers in a parallel effort to
succeed. One other point must be considered. The public key in this example was
129 digits. Many are 300 digits in length, vastly complicating the factoring. (Singh)
Public key encryption makes other forms of hacking more appealing than breaking
the key for encryption.
~7~
The public key can be regenerated as often as it is needed. How often that occurs is
determined by a companys security protocols. Based on prime numbers, the
encryption has a large number of possibilities. The number of prime numbers is at
this time limited, but the total number of prime numbers has been proven to be
infinite. If, or when, a better method of finding prime numbers is developed, the
flexibility of public key encryption will increase. 8
8 Garrett, Paul. Making, Breaking Codes. Upper Saddle, N J: Prentice Hall, 2001.
~8~
~9~
Appendix A
Table 1: ASCII Codes
Charact
er
0
1
2
3
4
5
6
7
8
9
:
;
<
=
>
?
@
A
B
C
D
E
F
G
H
I
J
ASCII
value
075
076
077
078
079
080
081
082
083
084
085
086
087
088
089
090
091
092
093
094
095
096
097
098
099
100
101
Charact
er
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
[
\
]
^
_
~ 10 ~
a
b
c
d
e
ASCII
value
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
Charact
er
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
Prime Numbers
2
13
31
53
73
101
127
151
179
199
233
263
283
317
353
383
419
443
467
503
3
17
37
59
79
103
131
157
181
211
239
269
293
331
359
389
421
449
479
509
5
19
41
61
83
107
137
163
191
223
241
271
307
337
367
397
431
457
487
521
~ 11 ~
7
23
43
67
89
109
139
167
193
227
251
277
311
347
373
401
433
461
491
523
11
29
47
71
97
113
149
173
197
229
257
281
313
349
379
409
439
463
499
541
Bibliography
Garret, P. (2001). Making,Breaking Codes. Upper Saddle River,NJ: Prentice Hall.
Pickover, C. (2009). The Math Book. London: Sterling.
~ 12 ~
Index
E
Encryption 4, 5, 6, 7
I
internet 3, 4
Internet 3
M
Medical records 5, 7
P
Passwords 7
Prime numbers 5, 6
Private key 5
Public key 4, 5, 6, 7
S
Security 6, 7
U
Username 7
~ 13 ~