Photo by Michael Dziedzic on Unsplash

The Ohm’s Law of Cybersecurity?

--

When I studied electrical engineering the most fundamental equation related to Ohm’s Law. Without an understanding of that, there was little in the way of understanding of the field. So, in Cybersecurity, what’s the equivalent to Ohm’s Law? Well, to me, it is the principles of public-key encryption, and especially to RSA. With RSA, we have the magic of public-key encryption, and where Bob can generate a key pair: a public key and a private key, and then send Alice his public key. If she wants to encrypt something for him, she encrypts it with his public key, and then the only key which can decrypt it is his private key. A truly wonderful concept and it was Rivest, Shamir and Adleman (RSA) who made it come alive with the RSA method.

And so, the work for the new semester basically starts when the old semester is finished, and I’m revising all my cryptography labs so that they mainly use a single Python library: cryptography. Within this library there are Hazmat primitives, and which are defined as possibly being insecure in a production environment, but which are great at outlining the core principles of cryptography. To import the RSA related methods we just add:

from cryptography.hazmat.primitives.asymmetric import rsa

RSA key generation

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.