Bringin math to social problems
Contents
Do not try and bend the spoon. That’s impossible. Instead… only try to realize the truth.
Encryption and Hashing
At the bottom (or as deep as I am willing to go right now) we have encryption and hashing. Both of these patterns use cryptography to provide some guarantees which are simple to understand, even if how they are being guaranteed is a little on the mindbending side. These guarantees might seem just neat at first, but when combined, create tools which are used everywhere today and have endless potential.
Encryption is a mapping of any piece of data and a key to another piece of data: data + key => other_data
. But encryption provides some interesting guarantees (backed by the maths) about this relationship.
++ ++
   
 data1+key++>other_data1 
   
   
 data2+key++>other_data2 
   
   
 data3+key++>other_data3 
   
   
 data4+key++>other_data4 
   
++ ++
Encryption is a onetoone relationship.
 It is impossible to calculate the original
data
fromother_data
without thekey
.  It is impractical to even try guessing (would take mindbending amounts of time).
 Changing the input data or key just a little, results in a completely different output.
So encryption is a practical way to scramble data.
Hashing is a mapping of any piece of data to a much smaller (fixed sized, really tiny) piece of data: data => small_data
. Hashing has similar guarantees to encryption, with a twist of its own.
++ ++
   
 data1+++>small_data1 
    
    
 data2++  
   
   
 data3++>small_data2 
   
   
 data4++>small_data3 
   
++ ++
Hashing is a manytoone relationship.
 Like encryption, it’s impossible to calculate
data
fromsmall_data
.  Also impractical to even try guessing.
 Changing the input data just a little also results in a completely different output.
What is the twist? That manytoone relation implies that different input data maps to same output. A collision! But, and we have to trust the mindbending maths again here, the chances of a collision are just so, so, so, SO small…we just don’t worry about it.
So hashing is a practical way to identify data.
symmetric and asymmetric
Encryption comes in two forms: symmetric and asymmetric. These have to do with the type of key used in the mapping.
Symmetric is when the same key
is used to encrypt and decrypt the data. This is straightforward to understand, but limits the use cases. One of the obvious use cases of encryption is to transfer date without others being able to read it. The data is safe to transfer since it’s scrambled, but how do you transfer the key?
Enter asymmetric encryption. Asymmetric encryption uses more of that mindbending maths to create two keys which have a nifty relationship: encryption with one can only be decrypted with the other. The “how do you transfer the key?” question can now be answered:
 The data recipient (let’s call her Alice) sends her first key (let’s call it her public key) to the data sender (let’s call him Bob).
 Bob encrypts the data with Alice’s public key and sends her the encrypted data.
 Alice decrypts the data using the second key in her key pair (let’s call that her private key).
signatures
Digital signatures compose hashing and encryption. What is the use case? Data shooting across the internet goes through a lot of intermediate servers and routers which are not controlled by the data sender or data receiver. It is possible that the intermediate servers could tamper with some data or pretend to be a sender. A data receiver wants to verify who sent data and what data did they send? The data needs a signature.
The signature pattern begins with a small chunk of data sent alongside the original data. A message authentication code (MAC). How does this chunk of data allow a receiver to verify who and what?
 The data sender uses hashing to create a small identifier for the data being sent.
 The data sender encrypts the small identifier (this is a Hashed MAC or HMAC).
 The data sender sends the HMAC along with the data to the data receiver.
 The data receiver decrypts the HMAC and hashes the data.
 If the two values match they know who sent the data and that it hasn’t been tampered with.
If the sender and receiver are the same person (e.g. maybe sending a data to a different storage) symmetric encryption can be used since the key never needs to be sent. Asymmetric encryption is used if the sender and receiver are different people.
++
 Data 
+++

 Hash

v
++ ++
 ID +>Signature
++ ++
Encrypt
Generate HMAC signature.
++ ++
 Data  Signature
+++ +++
 
 Hash  Decrypt
 
v v
++ ++
 ID  ==  ID 
++ ++
Validate data with signature.
Prime Numbers
Prime numbers show up a bunch in cryptographic implementations. But why?
A prime number’s only factors are itself and one. This seems kinda random, but this characteristic has made it a building block for a ton of math, including cryptography things. Prime’s are “building blocks” because they cannot be decomposed into smaller numbers like composites. For example, the composite number 12
can be broken down into the primes 2*2*3
. This breakdown is unique, there is only one set of primes a composite breaks down to, and this is so important it is called the Fundamental Theorem of Arithmetic!
If two prime numbers are multiplied together, the result can only be factored by 1, the two primes, or the result itself. This is called a semiprime.
A ton of research has been poured in to figuring out how to quickly find the factors of a number. Does an algorithm exist which is more efficient than just guessing numbers which could possibly be factors and checking real quick. The answer at the moment appears to be “no”, but we also haven’t proven that the answer is no. This “one way” function aspect though is the crux of a lot of cryptography. If you take two prime numbers and multiply them to get a semiprime, you now have a number which you know only has 4 factors. And you know the two (the original primes) which would be really hard to calculate.
If two numbers have no prime factors in common, they are described as relatively prime (or coprime or mutually prime). This means their greatest common denominator is 1
. Obviously if either of the two numbers is prime, it goes a long way for them to be relatively prime.
modulus
In cryptography, prime numbers are often combo’d with the modulus binary operation.
n = m*floor(n/m) + n mod m
The floor(n/m)
is the quotient and n mod m
is the remainder.
The modulus operation is dealing with the remainder of what is left after dividing n
by m
.
x mod y = x  y*floor(x/y)
Helpful way to view the mod
binary operation.
Seeing how the modulus deals with division and prime’s can’t be divided, you can start to get a feel for why these two things may be a potent combo. Two numbers are considered congruent if a == b (mod m)
.
The combo is often seen “modulo over a prime” in order to define finite fields. A field is a set which has two binary operators, commonly called “addition” and “multiplication”. These operators have to follow a bunch of rules for the field to be considered a field, one of which is that the operation is “closed”. This means the operations takes values from the set as input and outputs a value from the same set. Addition is pretty straight forward, but multiplication over a modulo can cause some issues here. If the modulo is over a composite, not a prime, than the output set is smaller than the input set. This is easiest to see with a multiplication table.
// Over a prime.
 0 1 2 3 4
+
0  0 0 0 0 0
1  0 1 2 3 4
2  0 2 4 1 3
3  0 3 1 4 2
4  0 4 3 2 1
// Over a composite.
 0 1 2 3
+
0  0 0 0 0
1  0 1 2 3
2  0 2 0 2
3  0 3 2 1
Multiplication over a composite modulo shrinks the set, so it isn’t closed, so it is not a field.
If a field is over a prime p
, every member of that field is relatively prime with p
. Another way to describe multiplication is “repeatedly sum up a value x
, y
times, starting at 0
”. And x
is relatively prime with p
. Taking a look at the top grid above, x
and y
are the two axis, and for a fixed x
column (or row, doesn’t really matter how you view it) you can see every member of the set. In other words y*x
is different for every y
. If a member showed up twice in a column, that would mean that x
and m
would have to have another factor.
So if x
and m
are relatively prime, there exists only one y
such that y*x = 1 (mod m)
. These are multiplicative inverses since they cancel each other out: (y*x*z) % m == 1*z % m == z % m
. The multiplicative inverse, x^1
, is not a linear function, so you sometimes see it in cipher substitutionpermuation networks.
Galois (Finite) Fields
Cryptography loves finite fields! They show up pretty much everywhere.
It is also common to layer groups and fields. In elliptic curve math, the “top” layer is the set of points on the curve and addition. Those are across the “bottom” layer of a finite field of integers modulus a prime number. Another example is the polynomial ring layer over the super nifty modulus two, GF(2)
, field used in AES’s Rijndael cipher.
That polynomial ring layer is a weird one, but I think super powerful for a lot of reasons (many of which I don’t know). One that is clear in the cryptography domain though, is the addition operation over the field is just a bitwise XOR. So, very efficient for CPUs to calculate.
xor
The exclusive OR operator shows up a bunch in cryptography. It has a few characteristics which make it very useful in this context. It is also simple to implement and cheap.
0 1
+
0  0 1
1  1 0
XOR table, notice the balance of 1
s and 0
s.
A XOR 0 = A
A XOR A = 0
A XOR B = B XOR A
(A XOR B) XOR B = A
Fun XOR things. That last one is extra intriguing.
One cryptographic downside of XOR is that it is linear.
Forward Secrecy
Forward Secrecy is a feature of protocols where even if longterm secret keys are compromised, shortterm session keys remain secret. So past sessions are protected. This reduced the motivation for attackers since they can’t decode past ciphertext even if they have it.
Linearity
If all parts of a cipher are linear, having the property, than it makes it much easier to attack. An attacker could take ciphertext and easily remove huge chunks of possible messages. This is how many efficient algorithms operate (e.g. gaussian elimination or binary search), but must not be a characteristic of a cipher. Ideally, all messages have equal possibility of being a ciphertext. What we want is a bent function.
What is linear depends on a space’s notion of addition and multiplication. f(t) = c + g(t)
where c is a constant and g has the property that g(a + b) = g(a) + g(b)
. Over real numbers, g(x)
can just be scalar multiplication (multiply by a constant). Variables are never multiplied by each other – they are only ever multiplied by constants in a linear function.
Linearity can be measured by approximating a function with the “best” linear version (I would guess this gets hard to find with higher complexity functions) of the function. The more overlap with same input/outputs with the approximate linear function, the worse the function is at being nonlinear.
Linear functions of different spaces can be combined to form a nonlinear function in both. This is a little tricky. If F
is over a field, but has an internal step which happens to be linear over another field, that doesn’t much matter to F
. Maybe the part which is a real bender is interpreting a value in one field and then in another midfunction? This is a tactic used to break up linearity in the ARXbased rounds, where there is addition over a finite field of 2^N
, where N
is common register size like 32 or 64, and that is combo’d with an XOR operation, which is addition over a polynomial ring GF(2^N)
. The numbers in both these fields are 1:1, even though the operations are not related. So I don’t think there is any *morphisim between the fields, but it is still possible to flip back and forth between the operation outputs.
Zeroknowledge Proofs
Zeroknowledge proofs (zkproofs) are a cryptographic protocol that enables one person (the prover) to convince another (the verifier) that a particular claim is true without disclosing any details about the claim itself.
Flipping a proof on its head in order to prove something without revealing it. Show things that would be difficult or impossible to know without having that information…In mathematical NPComplete terms: translate statement to a map which has a threecoloring, you can share map. All parties know the statement maps to the map. The threecoloring is the proof, the secret. The verifier can be convinced that the prover has the coloring proof by asking for the color of two spots on the map over and over again.
practical application
++
Private Input >  
 Deterministic  > Public Output
 Program 
Public Input >  
++
Public Input, the Program (a.k.a. circuit), and Public Output can be used to form a proof.
 Proof of large computation (validity proof).
A verifier can check a proof instead of performing a large computation themselves. Building this proof may be computationally expensive, but could pay off in the long run since verification is generally pretty light.
 Proof of secret holder.
A verifier can check a proof to be convinced that the prover is holding a secret without having to give it away.