How "deep" is the theory of encryption keys? Can a "generalist" approach designing new keys or understanding state of the art "security" or does one need to be a number theorist?
2026-03-25 23:58:47.1774483127
How "deep" is the theory of encryption keys? Can a "generalist" approach it or does one need to be a number theorist?
70 Views Asked by Bumbble Comm https://math.techqa.club/user/bumbble-comm/detail At
1
There are 1 best solutions below
Related Questions in NUMBER-THEORY
- Maximum number of guaranteed coins to get in a "30 coins in 3 boxes" puzzle
- Interesting number theoretical game
- Show that $(x,y,z)$ is a primitive Pythagorean triple then either $x$ or $y$ is divisible by $3$.
- About polynomial value being perfect power.
- Name of Theorem for Coloring of $\{1, \dots, n\}$
- Reciprocal-totient function, in term of the totient function?
- What is the smallest integer $N>2$, such that $x^5+y^5 = N$ has a rational solution?
- Integer from base 10 to base 2
- How do I show that any natural number of this expression is a natural linear combination?
- Counting the number of solutions of the congruence $x^k\equiv h$ (mod q)
Related Questions in SOFT-QUESTION
- Reciprocal-totient function, in term of the totient function?
- Ordinals and cardinals in ETCS set axiomatic
- Does approximation usually exclude equality?
- Transition from theory of PDEs to applied analysis and industrial problems and models with PDEs
- Online resources for networking and creating new mathematical collaborations
- Random variables in integrals, how to analyze?
- Could anyone give an **example** that a problem that can be solved by creating a new group?
- How do you prevent being lead astray when you're working on a problem that takes months/years?
- Is it impossible to grasp Multivariable Calculus with poor prerequisite from Single variable calculus?
- A definite integral of a rational function: How can this be transformed from trivial to obvious by a change in viewpoint?
Related Questions in CRYPTOGRAPHY
- What exactly is the definition of Carmichael numbers?
- What if Eve knows the value of $S$ in digital signiture?
- Relative prime message in RSA encryption.
- Encryption with $|K| = |P| = |C| = 1$ is perfectly secure?
- Cryptocurrency Math
- DLP Relationship of primitive roots $\pmod{p}$ with $p$ and $g$
- Hints to prove $2^{(p−1)/2}$ is congruent to 1 (mod p) or p-1 (mod p)
- Period of a binary sequence
- generating function / stream cipher
- RSA, cryptography
Trending Questions
- Induction on the number of equations
- How to convince a math teacher of this simple and obvious fact?
- Find $E[XY|Y+Z=1 ]$
- Refuting the Anti-Cantor Cranks
- What are imaginary numbers?
- Determine the adjoint of $\tilde Q(x)$ for $\tilde Q(x)u:=(Qu)(x)$ where $Q:U→L^2(Ω,ℝ^d$ is a Hilbert-Schmidt operator and $U$ is a Hilbert space
- Why does this innovative method of subtraction from a third grader always work?
- How do we know that the number $1$ is not equal to the number $-1$?
- What are the Implications of having VΩ as a model for a theory?
- Defining a Galois Field based on primitive element versus polynomial?
- Can't find the relationship between two columns of numbers. Please Help
- Is computer science a branch of mathematics?
- Is there a bijection of $\mathbb{R}^n$ with itself such that the forward map is connected but the inverse is not?
- Identification of a quadrilateral as a trapezoid, rectangle, or square
- Generator of inertia group in function field extension
Popular # Hahtags
second-order-logic
numerical-methods
puzzle
logic
probability
number-theory
winding-number
real-analysis
integration
calculus
complex-analysis
sequences-and-series
proof-writing
set-theory
functions
homotopy-theory
elementary-number-theory
ordinary-differential-equations
circles
derivatives
game-theory
definite-integrals
elementary-set-theory
limits
multivariable-calculus
geometry
algebraic-number-theory
proof-verification
partial-derivative
algebra-precalculus
Popular Questions
- What is the integral of 1/x?
- How many squares actually ARE in this picture? Is this a trick question with no right answer?
- Is a matrix multiplied with its transpose something special?
- What is the difference between independent and mutually exclusive events?
- Visually stunning math concepts which are easy to explain
- taylor series of $\ln(1+x)$?
- How to tell if a set of vectors spans a space?
- Calculus question taking derivative to find horizontal tangent line
- How to determine if a function is one-to-one?
- Determine if vectors are linearly independent
- What does it mean to have a determinant equal to zero?
- Is this Batman equation for real?
- How to find perpendicular vector to another vector?
- How to find mean and median from histogram
- How many sides does a circle have?
I think there is a bit of confusion here. There is a difference between a cryptosystem, an encryption scheme, and an encryption (or decryption) key.
Nonetheless, the short answer is No, you don't have to be a mathematician or computer scientist to play with the design of cryptosystems. However, you do need to be a mathematician or computer scientist for anyone else to take you seriously if you want to share your work. Also, most cryptographers are not number theorists.
Now a longer answer.
A whole cryptosystem will include an encryption scheme, a decryption scheme, and some method to generate the necessary keys. One might use the encryption scheme to encrypt a message $M$ into some sort of ciphertext $C$, and then use the decryption scheme to decrypt the ciphertext $C$ back into $M$ --- using the keys where necessary.
A good cryptosystem will have easy-to-compute encryption and decryption steps, but have them be hard (i.e. computationally infeasible) to break without the key. Current cryptosystems generally rely heavily on a single "hard problem", something which people reasonably believe is easy-to-compute and hard-to-break. The problems in use today are factoring (or closely related, the RSA problem), computing discrete logarithms, finding shortest vectors in a lattice, finding nearest vectors in a lattice, or (closely related to the previous two, finding a "good basis" for a lattice when given a "bad basis").
Almost every cryptosystem in use relies on one of these hard problems.
It is rather easy to think of new encryption and decryption schemes. If one can show that breaking a proposed scheme reduces to solving one of these hard problems, then people would believe the scheme --- then it's a question of whether the scheme is "better" (faster, easier-to-compute, smaller key sizes, smaller ciphertext sizes, or something along these lines).
If the proposed scheme doesn't rely on one of these hard problems, then it will take years and years for people to really look twice at it. This is because historically, most proposed hard problems haven't actually been so hard after all. The current lattice-based cryptosystems were first proposed in a modern sense with NTRU in the early 90s, and it wasn't until over 10 years later that people began to think that lattice-based cryptography might work out.
To generate improved implementations of a current cryptosystem is an important task, but more often this falls to computer scientists and cryptographers than raw number theorists. Equally important are implementation-based attacks on cryptosystems (as opposed to breaking the underlying mathematics) --- a true implementation of RSA will include padding and time obfuscation to obscure timing attacks. This is also frequently the domain of computer scientists and cryptographers.
To generate keys for a given cryptosystem is usually very easy. One might read the specification for the cryptosystem and follow it. Deviating from the spec is usually an insecure idea. But there are classes of keys which are advised against for little reason other than some heuristic, and it is conceivable that one might find it fun to improve understanding of key generation. But typically people find it both more fun and more approachable to prove sets of keys as bad, since this usually amounts to coming up with some clever attack.
Finally, very many mathematicians, computer scientists, programmers, and cryptographers think about these topics all the time. They have conferences, journals, their own jargon, and their own habits. If one hopes to add their collective body of knowledge, it is necessary to engage with them through the same major channels: conferences, journals, etc. You should expect that the difficulty and challenges facing an amateur cryptographer to be roughly analogous to the difficulty and challenges facing an amateur mathematician. These challenges are not insurmountable, but also not small.