
Cryptography dates all the way back to the times of Julius Caesar. In its simplest terms, the science of cryptography is merely the scrambling and the descrambling of written messages between two individual parties.
These individual parties can also be referred to as the sender and the receiver. The former creates the text and scrambles it into an undecipherable state, and in turn, the latter receives the text and unscrambles it into a decipherable format.
A very simple example is “I LOVE YOU.” The sending party would scramble this message by rearranging the letters as “UYO I VEOL.” This message would then stay in this scrambled format while it is in transit, until it is received by the receiving party.
They would then descramble it, so it would read once again “I LOVE YOU.” If this message were to have been captured by a malicious third party, the content would be rendered useless and totally undecipherable. This is the essence of cryptography.
Specifically, it can be defined as:
“. . . creating written or generated codes that allow information to be kept secret. Cryptography converts data into a format that is unreadable for an unauthorized user, allowing it to be transmitted without unauthorized entities decoding it back into a readable format, thus compromising the data.”¹
Scrambling and descrambling are also known as encryption and decryption, respectively.
How does this actually work? It happens through the use of a mechanism known as a key. This is very similar to a traditional physical key—you use it to lock your door when you leave and unlock it when you return. In the digital world, this is known as a Digital Key.
A digital key is based upon a mathematical value and is stored on the computers of both the sender and the receiver.
In a symmetric system, both Party A and Party B use the exact same key to both scramble and descramble the message. While this provides security, it has an inherent flaw: if either party accidentally reveals the key to an outsider, the security of the entire system is eradicated.
To solve the "shared secret" problem, a newer system uses a pair of keys:
This Public/Private Key combination offers a significantly higher layer of security and is the standard for modern digital communications.
[Image showing the difference between Symmetric (one key) and Asymmetric (two keys) encryption workflows]
This article has examined the fundamentals of cryptography. Of course, the field is much more complex, especially regarding the specific mathematical algorithms used for encryption and decryption. A future article will examine some of the more widely used algorithms in further detail.