Encoding and Encryption

In our age of Internet technologies, when we trust all our data to Internet services, we need to know and understand how they store and process them.





But why do you even need to know? In order to simply not get into a situation where your personal data, passwords from accounts or bank cards will end up in the hands of fraudsters. As the saying goes: "Trust but verify"





Important aspects in storing data, whether on external servers or on a home computer, are primarily encoding and encryption. But how do they differ from each other? Let's figure it out!





It's not a secret for anyone that a computer can store information, but it cannot store it in the form we are accustomed to: we cannot just write an abstract on a flash drive, we cannot draw a picture on a hard disk so that a computer can recognize it. To do this, information needs to be converted into a language that a computer can understand, and this process is called encoding. When we press a button on the keyboard, we transmit the character code that the computer can recognize, not the character itself.





Definitions and differences

Coding is the process of converting information available to us into comprehensible computer information.





Encryption is the process of changing information so that only the right users can get it.





Encryption was used long before the creation of computers and computer science as such. But why? The purposes of its application could be understood from the definition, but I will describe them again in more detail. The main goals of encryption are:





  • confidentiality - data is hidden from strangers





  • integrity - preventing information change





  • identifiability - the ability to identify the sender of data and the impossibility of sending them without the sender





You can evaluate the strength of the cipher using the cryptographic strength.





Cryptographic strength is the property of a cipher to resist cryptanalysis, study and decryption of the cipher.





The cryptographic strength of a cipher is divided into two main systems: absolutely secure systems and sufficiently strong systems .





โ€“ . :

















, : , . .





โ€“ , . :













.





โ€“ , . , .





. 1300 โ€“ . :n-i + 1, :





  • n



    โ€“





  • i



    โ€“ .





, , - ยซยป, ยซยป, ยซยป, ยซยป



. ,









, โ€“ . , - . , , - . , โ€” , . ยซRSAยป, 1977 .





, โ€“ .





: โ€” , 1, .





. , 223 13. 2899 โ€“ , . ยซยป .





โ€“ , , .





, , :





 ฯ† (26) [ ] = - , 26, 26.





:





1 โ€“ , ;





2 โ€“ 2, 1, 26, - ;





3 โ€“ 3, 1, 26 3, - ;





4 โ€“ 2 1 26 - ;





5 โ€“ 1 - ;





 6 โ€“ 2 1 - ;





7 โ€“ 1 โ€“ ;





25.





12. : ฯ†(n*k) = (n-1)(k-1)



26 2 * 13, ฯ†(26) = ฯ†(2 * 130) = (2-1)*(13-1) = 1 * 12 = 12







, , โ€“ ฯ†(2899) = ฯ†(223 * 13) =(223 โ€“ 1)*(13-1) = 222 * 12 = 2664







. , ยซยป.





โ€“ , . 13. 13 2664. , . 5, 13





โ€“ . : d * e mod ฯ†(n) = 1



,





  • ฯ†(n)



    -





  • e โ€“





  • mod โ€“





d, , , d = ceil(ฯ†(n) / e)



, ceil โ€“ .





205





โ€“ . , . , 3- ,





, , - , : 92. 92 โ€“ T ^ e mod n



,





  • T โ€“





  • e โ€“





  • n โ€“





  • mod โ€“





92 ^ 13 mod 2899 = 235



. 235 .





, ,





โ€“ C ^ d mod n



,









  • โ€“





  • d



    โ€“





  • n



    โ€“





  • mod



    โ€“





235 ^ 205 mod 2899 = 92.







, . , ? , , , , , , 2899 , , 223 13,





, .





โ€“ . , . , .





โ€“ . : ยซ - ยป, , .





โ€“ .





โ€“ . , , . , , 5, 13 . -





, : . .





โ€“ , . BB-84.





, . , , , . 101001011. , . , โ€“ 1, โ€“ 0. , , , , , . โ€“ . , 1 45 . . 45 โ€“ 0.





101001011. โ€“ . 1, 2.





โ€“ 1(1), 0(2), 1(1), 0(1), 0(1), 1(2), 0(2), 1(1), 1(2). , , , , .





: 221111212. 2 : 1 2, : , , 50%.





โ€“ , โ€“ . , : 001000011. : , , . : 0100011. .





, - ? , 25% , . , , , . 1 (9 โ€“ 7)/9 * 100% = 22%



, 50%, , , 50%





After reading and analyzing this article, we learned how coding differs from encryption, their history with the future, learned what an ideal cipher should be and talked a little about crypto analysis. Already with this knowledge, which was provided in this article, you can safely go and do some kind of authorization system or try to hack some site, the main thing is not to overdo it.





List of literature and materials:

  • "RSA" and quantum encryption





  • Quantum encryption





  • Encryption algorithm: "RSA"





  • Encryption algorithm: "RSA"





  • Encryption is generic





  • What is coding





  • The world's first ciphers





  • What is an exhibitor





  • What is the Euler function








All Articles