134 R¨udiger Reischuk and Markus Hinkelmann
2. Its inverse operation, splitting a product back into its prime divisors,
cannot be done efficiently – at least according to the current state of
knowledge in informatics and mathematics.
How can we make use of such a situation in general? In mathematics, the
term function denotes an operation that transforms mathematical objects into
other objects. In our case, the objects are numbers or sequences of numbers.
Factorization can be considered as the inverse function to multiplication.
An operation that can be computed easily, but for which the inverse is
difficult is called a one-way function. Such functions are important for the
encryption of messages. Instead of sending the original message M one could
send the result of applying the one-way function to M . The encryption can
be done fast, whereas the decryption, that is, applying the inverse function,
is very difficult according to the properties of one-way functions. An attacker
thus has no chance to deduce M from its encryption.
Consider the following example. Alice wants to send to Bob the message
“top secret”. Let us assume that they use only capital letters and instead of a
space between two words write the letter “X”. The letters are then numbered
with 01 up to 26 and each letter is replaced by its number. Then
TOPXSECRET
turns into
T = 201516240503180520.
In general, T will not be prime; however, by adding a few digits at the right
end one can always make this number prime – in our case, for example, using
the digits 13 we get the prime number
p = 20151624050318052013.
Then Alice chooses a second slightly larger prime number, for example,
q = 567891624050318052137
and computes their product
N = p · q = 11443938509186566743788165964622411801781.
This number N can be sent by Alice to Bob without any worry – nobody will
be able to decipher the message p,resp.T since this would mean that the
factorization of N has been found. To be honest, these numbers are too small
to guarantee high security – in reality one should choose prime numbers with
at least 150 digits, thus Alice simply adds more digits to T to generate a p
that is long enough.
But, wait, even Bob cannot decrypt the message. Grrrrr . . . encryption
with one-way function is not totally simple. We need an additional trick.
A one-way function f with secret information, in technical terms a
trapdoor function, has the following additional property: