Cryptographic primitives | Cryptography | Theory of cryptography

Trapdoor function

In theoretical computer science and cryptography, a trapdoor function is a function that is easy to compute in one direction, yet difficult to compute in the opposite direction (finding its inverse) without special information, called the "trapdoor". Trapdoor functions are a special case of one-way functions and are widely used in public-key cryptography. In mathematical terms, if f is a trapdoor function, then there exists some secret information t, such that given f(x) and t, it is easy to compute x. Consider a padlock and its key. It is trivial to change the padlock from open to closed without using the key, by pushing the shackle into the lock mechanism. Opening the padlock easily, however, requires the key to be used. Here the key t is the trapdoor and the padlock is the trapdoor function. An example of a simple mathematical trapdoor is "6895601 is the product of two prime numbers. What are those numbers?" A typical "brute-force" solution would be to try dividing 6895601 by several prime numbers until finding the answer. However, if one is told that 1931 is one of the numbers, one can find the answer by entering "6895601 ÷ 1931" into any calculator. This example is not a sturdy trapdoor function – modern computers can guess all of the possible answers within a second – but this sample problem could be improved by using the product of two much larger primes. Trapdoor functions came to prominence in cryptography in the mid-1970s with the publication of asymmetric (or public-key) encryption techniques by Diffie, Hellman, and Merkle. Indeed, coined the term. Several function classes had been proposed, and it soon became obvious that trapdoor functions are harder to find than was initially thought. For example, an early suggestion was to use schemes based on the subset sum problem. This turned out – rather quickly – to be unsuitable. As of 2004, the best known trapdoor function (family) candidates are the RSA and Rabin families of functions. Both are written as exponentiation modulo a composite number, and both are related to the problem of prime factorization. Functions related to the hardness of the discrete logarithm problem (either modulo a prime or in a group defined over an elliptic curve) are not known to be trapdoor functions, because there is no known "trapdoor" information about the group that enables the efficient computation of discrete logarithms. A trapdoor in cryptography has the very specific aforementioned meaning and is not to be confused with a backdoor (these are frequently used interchangeably, which is incorrect). A backdoor is a deliberate mechanism that is added to a cryptographic algorithm (e.g., a key pair generation algorithm, digital signing algorithm, etc.) or operating system, for example, that permits one or more unauthorized parties to bypass or subvert the security of the system in some fashion. (Wikipedia).

Trapdoor function
Video thumbnail

What is the difference of a trapezoid and an isosceles trapezoid

👉 Learn how to solve problems with trapezoids. A trapezoid is a four-sided shape (quadrilateral) such that one pair of opposite sides are parallel. Some of the properties of trapezoids are: one pair of opposite sides are parallel, etc. A trapezoid is isosceles is one pair of opposite sides

From playlist Properties of Trapezoids

Video thumbnail

What are some characteristics of an isosceles trapezoid

👉 Learn how to solve problems with trapezoids. A trapezoid is a four-sided shape (quadrilateral) such that one pair of opposite sides are parallel. Some of the properties of trapezoids are: one pair of opposite sides are parallel, etc. A trapezoid is isosceles is one pair of opposite sides

From playlist Properties of Trapezoids

Video thumbnail

What is a trapezoid

👉 Learn how to solve problems with trapezoids. A trapezoid is a four-sided shape (quadrilateral) such that one pair of opposite sides are parallel. Some of the properties of trapezoids are: one pair of opposite sides are parallel, etc. A trapezoid is isosceles is one pair of opposite sides

From playlist Properties of Trapezoids

Video thumbnail

How to Make a Swinging Log Trap

This is a very cool trap seen in quite a few movies. The mechanism uses the weight of the falling logs to smash what comes between them. It is more of a trap to build just to have some fun smashing things than it is practical for obtaining food. Enjoy. -~-~~-~~~-~~-~- Check out my latest

From playlist Practical Projects & Skills

Video thumbnail

Finding the value of x using a trapezoid alternate interior angles and supplementary

👉 Learn how to solve problems with trapezoids. A trapezoid is a four-sided shape (quadrilateral) such that one pair of opposite sides are parallel. Some of the properties of trapezoids are: one pair of opposite sides are parallel, etc. A trapezoid is isosceles is one pair of opposite sides

From playlist Properties of Trapezoids

Video thumbnail

Finding the value of x using a trapezoid alternate interior angles and corresponding

👉 Learn how to solve problems with trapezoids. A trapezoid is a four-sided shape (quadrilateral) such that one pair of opposite sides are parallel. Some of the properties of trapezoids are: one pair of opposite sides are parallel, etc. A trapezoid is isosceles is one pair of opposite sides

From playlist Properties of Trapezoids

Video thumbnail

Learning to solve for the midsegment of a trapezoid

👉 Learn how to solve problems with trapezoids. A trapezoid is a four-sided shape (quadrilateral) such that one pair of opposite sides are parallel. Some of the properties of trapezoids are: one pair of opposite sides are parallel, etc. A trapezoid is isosceles is one pair of opposite sides

From playlist Properties of Trapezoids

Video thumbnail

How to solve for the midsegment of a trapezoid

👉 Learn how to solve problems with trapezoids. A trapezoid is a four-sided shape (quadrilateral) such that one pair of opposite sides are parallel. Some of the properties of trapezoids are: one pair of opposite sides are parallel, etc. A trapezoid is isosceles is one pair of opposite sides

From playlist Properties of Trapezoids

Video thumbnail

Theory of numbers: RSA cryptography

This lecture is part of an online undergraduate course on the theory of numbers. We describe RSA cryptography, one of the the earliest and simplest public key cryptography systems. For the other lectures in the course see https://www.youtube.com/playlist?list=PL8yHsr3EFj52Qf7lc3HHvHR

From playlist Theory of numbers

Video thumbnail

Introduction to number theory lecture 18. Cryptography

This lecture is part of my Berkeley math 115 course "Introduction to number theory" For the other lectures in the course see https://www.youtube.com/playlist?list=PL8yHsr3EFj53L8sMbzIhhXSAOpuZ1Fov8 We give a brief introduction to the RSA method, an application of number theory to cryotog

From playlist Introduction to number theory (Berkeley Math 115)

Video thumbnail

Classical Verification of Quantum Computations - Urmila Mahadev

Computer Science/Discrete Mathematics Seminar I Topic: Classical Verification of Quantum Computations Speaker: Urmila Mahadev Affiliation: UC Berkeley Date: November 26, 2018 For more video please visit http://video.ias.edu

From playlist Mathematics

Video thumbnail

Stanford Seminar - The Evolution of Public Key Cryptography

EE380: Computer Systems Colloquium Seminar The Evolution of Public Key Cryptography Speaker: Martin Hellman, Stanford EE (Emeritus) While public key cryptography is seen as revolutionary, after this talk you might wonder why it took Whit Diffie, Ralph Merkle and Hellman so long to discov

From playlist Stanford EE380-Colloquium on Computer Systems - Seminar Series

Video thumbnail

Gambling with Secrets: 8/8 (RSA Encryption)

RSA Encryption - How & why it works. Euclid, Euler, Cocks and much more Link to time complexity graph used in the video: https://www.khanacademy.org/labs/explorations/time-complexity Newer animated version: https://www.khanacademy.org/math/applied-math/cryptography/modern-crypt/p/time-com

From playlist Cryptography, Security

Video thumbnail

RSA encryption: Step 2 | Journey into cryptography | Computer Science | Khan Academy

Setting up a trapdoor one-way function Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/rsa-encryption-step-3?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson? https://www.khanacademy.org/comput

From playlist Journey into cryptography | Computer Science | Khan Academy

Video thumbnail

Symmetry and Adaptation in C. Elegans Response to Touch - Massimo Vergassola

2015 Joshua Lederberg - John von Neumann Symposium "Towards Quantitative Biology" Massimo Vergassola University of California, San Diego December 2, 2015

From playlist Joshua Lederberg - John von Neumann Symposium

Video thumbnail

RSA encryption: Step 4 | Journey into cryptography | Computer Science | Khan Academy

RSA worked example Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/checkpoint-advanced-lessons?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson? https://www.khanacademy.org/computing/computer-s

From playlist Journey into cryptography | Computer Science | Khan Academy

Video thumbnail

The Best Science-Based Trap Workout for Growth

Of all the major muscle groups, the traps are one of the most important muscles for creating a powerful looking upper body and completing a well-developed frame. But when it comes to “the best trap workout for mass” or “how to get bigger traps”, most people seem to focus solely on the uppe

From playlist BEST SCIENCE-BASED WORKOUT ROUTINES

Video thumbnail

The RSA Cryptosystem

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Some Cryptographic Tools (in Blockchains) by Manoj Prabhakaran

DISCUSSION MEETING : FOUNDATIONAL ASPECTS OF BLOCKCHAIN TECHNOLOGY ORGANIZERS : Pandu Rangan Chandrasekaran DATE : 15 to 17 January 2020 VENUE : Madhava Lecture Hall, ICTS, Bangalore Blockchain technology is among one of the most influential disruptive technologies of the current decade.

From playlist Foundational Aspects of Blockchain Technology 2020

Video thumbnail

What is the trapezoid midsegment theorem

👉 Learn how to solve problems with trapezoids. A trapezoid is a four-sided shape (quadrilateral) such that one pair of opposite sides are parallel. Some of the properties of trapezoids are: one pair of opposite sides are parallel, etc. A trapezoid is isosceles is one pair of opposite sides

From playlist Properties of Trapezoids

Related pages

Subset sum problem | Inverse function | Integer factorization | Chinese remainder theorem | One-way function | Euler's totient function | Function (mathematics) | Brute-force attack | Theoretical computer science | Rabin cryptosystem | Public-key cryptography | Cryptography | IEEE Transactions on Information Theory | Backdoor (computing)