Encryption is the process of converting readable data (called plaintext) into unreadable code (called ciphertext) so that unauthorized people canβt read it. It protects your data from hackers, spies, or anyone who shouldnβt see it.
Example:
Imagine you want to send the message:
"HELLO"
But you donβt want anyone to read it except your friend.
So you encrypt it using a secret method (for example, Caesar cipher shift by 3):
Now the encrypted message is:
"KHOOR"
Decryption is the reverse process: turning the ciphertext back into the original readable message (plaintext) using a key. Only someone with the correct key can decrypt and read the original message.
The Caesar Cipher is a substitution encryption technique where each letter in the plaintext is shifted a certain number of places down the alphabet.
For example, with a shift of 3, A
becomes D
, B
becomes E
, and so on. It's simple, fast, but easy to break.
π How It Works:
RSA is a public-key (asymmetric) encryption algorithm.
It uses two keys:
Unlike Caesar Cipher, RSA doesnβt rely on shifting letters β it uses math and prime numbers for secure communication.
Itβs named after its inventors:
They created RSA in 1977.
β RSA Step-by-Step Example
Let's use the same example as your textbook:
π Key Generation:
π Encryption (STOP β [2081, 2182]):
This matches your calculator's textbook example!
π Encryption:
ciphertext = (73) % 33
You send 13
.
π Decryption:
plaintext = (137) % 33
You got the original number back: 7
.
β Real-World Usage:
π Why RSA is Powerful: