Study smarter with Fiveable
Get study guides, practice questions, and cheatsheets for all your subjects. Join 500,000+ students with a 96% pass rate.
Cryptography sits at the intersection of number theory, modular arithmetic, and computational complexity—three pillars of discrete mathematics that you'll see tested repeatedly. When you study encryption methods, you're really studying how mathematical structures like prime factorization, discrete logarithms, and modular exponentiation create problems that are easy to compute in one direction but computationally infeasible to reverse. This "trapdoor" concept underlies nearly every secure system you interact with daily.
Understanding these methods means recognizing the mathematical hardness assumptions each one relies on and why those assumptions matter for security. You're being tested on your ability to identify which mathematical principle makes a cipher secure (or breakable), how key exchange protocols leverage group theory, and why certain algorithms scale better than others. Don't just memorize algorithm names—know what discrete math concept each method illustrates and where its vulnerabilities lie.
These historical ciphers introduce fundamental encryption concepts but rely on simple transformations that modern computing can break instantly. The mathematical weakness is that letter frequency patterns survive the encryption process.
Compare: Caesar Cipher vs. Vigenère Cipher—both use modular shifts, but Caesar uses one fixed shift while Vigenère cycles through multiple shifts based on keyword position. If asked about polyalphabetic vs. monoalphabetic substitution, Vigenère is your go-to example.
Symmetric cryptography uses the same key for encryption and decryption. The core mathematical challenge is secure key distribution—both parties must possess identical secret information before communication begins.
Compare: Block Ciphers vs. Stream Ciphers—both are symmetric, but blocks process fixed chunks while streams handle continuous data. Block ciphers offer more flexibility through modes of operation; stream ciphers offer speed. Know that AES (block) replaced RC4 (stream) in most protocols due to security concerns.
Public key systems solve the key distribution problem by using mathematically related key pairs. Security relies on computational asymmetry—operations that are easy to perform but infeasible to reverse without secret information.
Compare: RSA vs. Elliptic Curve Cryptography—both are public key systems, but RSA relies on integer factorization while ECC relies on the elliptic curve discrete logarithm problem. ECC achieves equivalent security with much smaller keys, making it dominant in mobile and IoT applications. FRQs may ask you to explain why key size matters for efficiency.
Key exchange allows two parties to establish a shared secret over an insecure channel. The mathematics relies on the discrete logarithm problem: computing is easy if you know or , but finding from is hard.
Compare: Diffie-Hellman vs. RSA—both enable secure communication, but Diffie-Hellman establishes a shared symmetric key while RSA directly encrypts messages. Diffie-Hellman requires additional authentication; RSA provides it inherently through key ownership. Modern TLS uses both: Diffie-Hellman for key exchange, RSA/ECC for authentication.
These methods ensure messages haven't been tampered with and verify sender identity. The mathematical foundation combines one-way functions with asymmetric cryptography.
Compare: Hash Functions vs. Digital Signatures—hashes verify data integrity (detecting changes), while signatures verify both integrity and authenticity (proving who sent it). A hash alone can't prove origin; a signature without hashing would be inefficient for large messages. They work together in practice.
| Concept | Best Examples |
|---|---|
| Modular arithmetic foundations | Caesar Cipher, Vigenère Cipher, RSA |
| Integer factorization hardness | RSA Algorithm |
| Discrete logarithm problem | Diffie-Hellman, Elliptic Curve Cryptography |
| Perfect secrecy (information-theoretic) | One-Time Pad |
| Symmetric encryption | Block Ciphers (AES), Stream Ciphers (RC4) |
| Key exchange without shared secrets | Diffie-Hellman, Elliptic Curve Diffie-Hellman |
| One-way functions | Hash Functions (SHA-256) |
| Authentication and non-repudiation | Digital Signatures |
Both RSA and Elliptic Curve Cryptography are public key systems—what different mathematical hardness assumptions does each rely on, and why does this affect key size requirements?
Which two methods discussed provide solutions to the key distribution problem, and how do their approaches differ?
Compare the Caesar Cipher and One-Time Pad: both use simple operations, yet one is trivially breakable and one is theoretically perfect. What mathematical property explains this difference?
If an FRQ asks you to explain why Diffie-Hellman requires additional authentication mechanisms while RSA does not, what would you argue?
A system needs to verify that a downloaded file hasn't been corrupted AND confirm it came from a trusted source. Which two cryptographic methods would you combine, and what role does each play?