{"id":852,"date":"2021-02-15T11:54:00","date_gmt":"2021-02-15T11:54:00","guid":{"rendered":"https:\/\/dev.cryptoloc.au\/?p=852"},"modified":"2023-10-03T06:21:59","modified_gmt":"2023-10-03T06:21:59","slug":"symmetry-in-motion-how-math-is-used-in-cryptography-to-fortify-cybersecurity","status":"publish","type":"post","link":"https:\/\/127.0.0.1\/symmetry-in-motion-how-math-is-used-in-cryptography-to-fortify-cybersecurity\/","title":{"rendered":"Symmetry in motion: How math is used in cryptography to fortify cybersecurity"},"content":{"rendered":"\n

Symmetry isn\u2019t just the key to a beautiful painting or a pretty face \u2013 it\u2019s also a key concept in cryptography. Cryptoloc chief executive Melissa Crossman explains how the mathematics of symmetry are used in cryptography.<\/em><\/p>\n\n\n\n

When Cheryl Praeger, Emeritus Professor of Mathematics at the University of Western Australia, won the Australian Prime Minister\u2019s Prize for Science in 2019 for her contributions to pure mathematics, it wasn\u2019t just a great victory for women in STEM. It was also an important recognition of the role that symmetry has come to play in cryptography.<\/p>\n\n\n\n

Professor Praeger specialises in the mathematics of symmetry, and developed algorithms that have since been built into computer systems and used by scientists and mathematicians around the world.<\/p>\n\n\n\n

\u201cI was very lucky that early in my career an immensely powerful mega-theorem was born, identifying all the mathematical atoms or building blocks of symmetry \u2013 the so-called finite simple groups,\u201d Professor Praeger says.<\/p>\n\n\n\n

\u201cI was one of the first to exploit this watershed result to build new fundamental theory and new methods to study groups and symmetrical structures like networks and designs.\u201d<\/p>\n\n\n\n

One area where symmetry has been instrumental is in the development of cryptographic keys. Essentially, a cryptographic key is a long word that looks like random letters and numbers. It encrypts confidential data using a complex mathematical equation that is only solvable with the appropriate cryptographic key.<\/p>\n\n\n\n

When the person encrypting and sending the data and the person receiving and decrypting the data have the exact same key, it\u2019s called a symmetric key. Because both parties have access to the key, the process is referred to as symmetric key cryptography.<\/p>\n\n\n\n

The most commonly used symmetric key algorithm is the Advanced Encryption Standard (AES), a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology in 2001.<\/p>\n\n\n\n

Other popular symmetric key algorithms include Twofish, Serpent, Camellia, Salsa20, ChaCha20, Blowfish, CAST5, Kuznyechik, RC4, DES, 3DES, Skipjack, Safer and IDEA.<\/p>\n\n\n\n

Symmetric key cryptography is useful for exchanging private information between known parties \u2013 but it\u2019s not without weaknesses.<\/p>\n\n\n\n

The symmetric key must be transported between parties, and is at risk of interception in what is known as a middle-man attack. A third party can intercept a copy of the symmetric key when it is first shared, and can decrypt any of the confidential data it protects.<\/p>\n\n\n\n

Asymmetric key encryption \u2013 also known as public key cryptography \u2013 was created to solve this vulnerability by creating a unique key for each user, while also offering the benefits of being able to identify individual users.<\/p>\n\n\n\n

Both the sender and the receiver have their private key that they keep secret. A one-way mathematical equation is then used to create a public key for each user. The public keys by themselves cannot be used to decrypt the information and can, therefore, be easily shared without creating a vulnerability.<\/p>\n\n\n\n

The sender of the information then encrypts the data using a combination of their private key and the intended recipients\u2019 public key. From then on, only their private key can decrypt the data, ensuring security.<\/p>\n\n\n\n

When different keys are used to encrypt and decrypt that same data, the keys are said to be asymmetric. Whenever you access a secure website \u2013 in other words, a site with a URL that starts with https \u2013 your browser communicates with that site using both a symmetric key and an asymmetric key.<\/p>\n\n\n\n

Today\u2019s secure data cloud storage and sharing systems, such as Cryptoloc<\/a>, tend to use a combination of several types of encryption keys and mechanisms, including symmetric, asymmetric and private-public cryptography, in order to avoid falling prey to the security weaknesses of any one particular mechanism.<\/p>\n\n\n\n

\u201cMathematics underpins every part of our digital technology,\u201d Professor Praeger says.<\/p>\n\n\n\n

\u201cIn particular, secure communication of our private data depends on novel protocols founded on the mathematics of symmetry, like those used by Cryptoloc.<\/p>\n\n\n\n

\u201cI am excited to think that my research in group theory may lead to future breakthroughs and innovations in cybersecurity and encryption solutions.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"

Symmetry isn\u2019t just the key to a beautiful painting or a pretty face \u2013 it\u2019s also a key concept in cryptography. Cryptoloc chief executive Melissa Crossman explains how the mathematics of symmetry are used in cryptography. When Cheryl Praeger, Emeritus Professor of Mathematics at the University of Western Australia, won the Australian Prime Minister\u2019s Prize […]<\/p>\n","protected":false},"author":3,"featured_media":1123,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/852"}],"collection":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/comments?post=852"}],"version-history":[{"count":1,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/852\/revisions"}],"predecessor-version":[{"id":853,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/852\/revisions\/853"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/media\/1123"}],"wp:attachment":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/media?parent=852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/categories?post=852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/tags?post=852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}