In this article, I will write a write-up for Public Key Cryptography Basics that covers the Common Use of Asymmetric Encryption, RSA, Diffie-Hellman Key Exchange, SSH, Digital Signatures and Certificates, as well as PGP and GPG to understand how public key ciphers like RSA work and explore their role in applications such as SSH.
In the analogy presented, what real object is analogous to the public key?
Lock
Knowing that p = 4391 and q = 6659. What is n?
29239669
Knowing that p = 4391 and q = 6659. What is ϕ(n)?
29228620
Consider p = 29, g = 5, a = 12. What is A?
7
Consider p = 29, g = 5, b = 17. What is B?
9
Knowing that p = 29, a = 12, and you have B from the second question, what is the key calculated by Bob? (key = Ba mod p)
24
Knowing that p = 29, b = 17, and you have A from the first question, what is the key calculated by Alice? (key = Ab mod p)
24
Check the SSH Private Key in
~/Public-Crypto-Basics/Task-5
. What algorithm does the key use?RSA
What does a remote web server use to prove itself to the client?
Certificate
What would you use to get a free TLS certificate for your website?
Let's Encrypt
Use GPG to decrypt the message in
~/Public-Crypto-Basics/Task-7
. What secret word does the message hold?Pineapple
You will have to import your key from tryhackme.key
then you’ll decrypt your message on message.gpg
Thank you for reading my article. Please leave any questions or comments on improving my learning journey and the THM challenges. We can also connect more on LinkedIn or X.