I’ve been trying to get my head around this and I’ve watched a few videos but they don’t seem to specifically answer my question.
According to what I’ve found online, messages encrypted with a public key can only be decrypted with a private key. But in practice, how is that possible?
Surely a public key contains a set of instructions, and anyone could just run those instructions in reverse to decrypt a message? If everything you need to encrypt a message is stored within a public key, then how is it a one-way process?
It’s likely that I’m misunderstanding a core element of this!
Ah thanks for the useful links! Those articles are all quite fascinating. In the plaintext attacks article, I love the tactic mentioned here:
Both cryptography and that part of history are fascinating topics. I can also recommend watching “The Imitation Game” with Benedict Cumberbatch starring as Alan Turing… I mean it’s just a movie and skips lots of the interesting stuff and details. YMMV.
It’s the beginning of computers. And I think especially that time has some interesting stories, discoveries/inventions and personas. There is also the history and role of women in computing which I think is something more people should know about and it’s related to that. After that we needed secrecy in the cold war. I think public key cryptography hasn’t been around until the 1970s. There had been export regulations on cryptography until after I was born. And modern encryption algorithms like AES are from the 1990s. Nowadays everyone and their grandma relies on the availability of secure communications.
I think I spent some nights jumping from Wikipedia article to Wikipedia article and reading all of that.