Photo by rizki rama28 on Unsplash

Bob Sends Alice A Box

--

I love cryptography. It provides me with an almost infinite field of learning. While I have saturated my knowledge in areas of data communication and network, it is cryptography that provides me with the beauty of maths, but the wonderment of providing the foundation of cybersecurity. With it, we can not only protect the privacy of messages from Bob to Alice, but we can identify that it was only Bob who send the message and that it has not been changed. For the first time in the history of humankind to can properly secure the messages we send.

A secret box

Now let’s say that Bob is a lawyer, and he wants to send a secret message to Alice. He takes a box from his shelf, and which has a unique key. He takes photograph of himself holding the message, and puts it into the box with the photography. Next, he takes a box that Alice send to him and puts the secret key into the box. Now Bob cannot open any of the boxes. He then sends the two boxes to Alice. Alice takes the second box, and sources the key to that box. She opens this box, and it contains the key for the first box, and then opens it. She then reads the message, and check the photography.

So how can we do this in public-key encryption?

We can use public-key encryption to produce an encrypted box from Bob to Alice. First, we take Bob…

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.