# PKI - Public and Private key pairs

Last updated:**PKI** or, *public-key infrastructure,* is a mathematical way of securing communication between two ends.

The reliability of this method rests on some properties of **prime numbers**.

**Prime numbers** are just integer numbers that have no smaller number that divides them, producing another integer, **e.g.:** 13 or 7 or 23.

It just so happens that nobody has yet created an **effective factorization (or factoring) algorithm** that, given a large number **a**, quickly outputs the list of numbers that divide **a**. For example, such algorithm would, if given **24** as input, output the list of numbers that divide 24: **1, 2, 3, 4, 6, 8, 12, 24**. There are, of course, some algorithms to do this but most of them **aren't very fast** and take waaay too much time (decades) to factorize a number with, for example, 200 digits.

So some computer scientists have noticed that this could be used to encrypt data being sent over a network.

That's where the concepts of **public key** and **private key** come into play.

Since large number are very hard to factorize, you could choose two very large (100 digits or more) **prime numbers** and multiply them together, yielding a (roughly) 200-digit number.

Generating large primes and performing multiplication, albeit with large numbers, is **relatively straightforward**.

Having the two (large) prime numbers and the (even larger) product of both, you could now create an **encrypting mechanism** whereby the product would be a **lock** and the two prime numbers a **key**.

As is the case with real-life locks and keys, your house isn't rendered less secure because your front door **lock** is exposed to everyone. Only by having a **key** can you enter your house.

That's **exactly** what happens when you use a **PKI** to secure communication between two parties. The difference is that the **lock** is called **public key** and the **key** you would use to open your home's door **private key**.

The **public key** (product of the two primes) can be used to verify that you have the correct primes that, when multiplied, yield that product. However, due to practical difficulties mentioned earlier in factorizing a large number, the **public key** can't be used to derive the **private key**, rendering the method safe.

**N.B.:** this is an oversimplified explanation of a PKI. Although qualitatively correct, there are many technical details that were left out.

Felipe
TECHNOLOGY

pki
math
cryptography