Public Key Cryptography
Every symmetric primitive assumes a shared key.
One-way functions with a secret shortcut.
A plausibly one-way trapdoor permutation scheme.
\[ \begin{aligned} &p \xleftarrow{R} \{\text{random } \ell\text{-bit prime} : \gcd(e, p-1) = 1\} \\ &q \xleftarrow{R} \{\text{random } \ell\text{-bit prime} : \gcd(e, q-1) = 1,\; q \neq p\} \\ &n \leftarrow pq \\ &d \leftarrow e^{-1} \bmod (p-1)(q-1) \\ &\textbf{return } (n, d) \end{aligned} \] - Luckily, there’s already an efficient algorithm to generate primes of a given size! - Likewise, the extended Euclidean algorithm can compute \(d\) efficiently
No mayonnaise jokes, please.
From shared secrets to usable keys.
More security per bit.
Putting it all together.
reject symbolOne slide, one result.
Protecting past sessions from future compromises.
Authentication with public keys.
What did we learn?
Ask now, catch me after class, or email eoin@eoin.ai
© 2026 Eoin O’Brien. All rights reserved.