<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Shreehari Menon</title>
    <description>The latest articles on DEV Community by Shreehari Menon (@shreehari_menon).</description>
    <link>https://dev.to/shreehari_menon</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1608587%2F3929b968-e57c-4e80-8ba1-810ad002b507.jpg</url>
      <title>DEV Community: Shreehari Menon</title>
      <link>https://dev.to/shreehari_menon</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/shreehari_menon"/>
    <language>en</language>
    <item>
      <title>What is Post-Quantum Cryptography? The Internet’s New Armor</title>
      <dc:creator>Shreehari Menon</dc:creator>
      <pubDate>Fri, 03 Apr 2026 03:31:01 +0000</pubDate>
      <link>https://dev.to/shreehari_menon/what-is-post-quantum-cryptography-the-internets-new-armor-3b46</link>
      <guid>https://dev.to/shreehari_menon/what-is-post-quantum-cryptography-the-internets-new-armor-3b46</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqitx31g368ixvcu3f09e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqitx31g368ixvcu3f09e.png" width="800" height="447"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Today’s cryptographic locks are strong - but not future-proof. Explore how Post-Quantum Cryptography is building the next generation of digital vaults.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  1. Introduction: The Obsolete Vault
&lt;/h4&gt;

&lt;p&gt;Imagine you are the chief security architect for a global bank. For the last thirty years, you have stored all the bank’s assets inside massive steel vaults. These vaults are mathematically guaranteed to withstand lockpicks, blowtorches, and dynamite. They have never been breached.&lt;/p&gt;

&lt;p&gt;Then, you read a theoretical physics paper. It proves that a new tool - a focused plasma laser - could slice through your steel vaults in a matter of minutes.&lt;/p&gt;

&lt;p&gt;The plasma laser hasn’t been built yet. The prototypes are currently the size of a warehouse and can barely cut through tin foil. It might take scientists ten or fifteen years to build a working, portable version of this laser.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;What do you do? Do you wait fifteen years to upgrade your security?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Of course not. By the time the laser is built, the bank robbers will already have it. Furthermore, bank robbers are already stealing your locked steel boxes today, hiding them in warehouses, and waiting for the day they can buy the laser to open them.&lt;/p&gt;

&lt;p&gt;You must start replacing every vault door in your bank &lt;em&gt;today&lt;/em&gt; with a new, laser-proof material.&lt;/p&gt;

&lt;p&gt;This is the exact situation the digital world faces right now. The “steel vaults” are our current cryptographic algorithms (RSA and ECC). The “plasma laser” is the impending Quantum Computer. And the “laser-proof material” we are scrambling to deploy is called &lt;strong&gt;Post-Quantum Cryptography (PQC)&lt;/strong&gt;.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Today, we will demystify PQC, explain what it is (and what it isn’t), and explore how the software engineering world is preparing for the largest security upgrade in human history.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h4&gt;
  
  
  2. Demystifying the Biggest Myth
&lt;/h4&gt;

&lt;p&gt;Before we define what Post-Quantum Cryptography &lt;em&gt;is&lt;/em&gt;, we must explicitly define what it is &lt;em&gt;not&lt;/em&gt;. This is the single biggest point of confusion for junior developers and engineering students.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Myth: “Post-Quantum Cryptography means using a quantum computer to encrypt data.”&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Fact: Post-Quantum Cryptography is just regular software running on regular computers.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There are two distinct fields that sound similar but are entirely different:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Quantum Cryptography (Hardware):&lt;/strong&gt; This involves using actual quantum physics (like shooting individual photons of light through fiber-optic cables) to securely transmit keys. This is known as Quantum Key Distribution (QKD). It requires highly specialized, incredibly expensive hardware.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Post-Quantum Cryptography (Software):&lt;/strong&gt; This is just new mathematics. It is a new set of algorithms written in standard programming languages (like C, Rust, or Python). You compile this code, and it runs on the normal silicon CPU inside your current laptop, iPhone, or web server.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;As a software developer, you will not need a quantum computer on your desk to write Post-Quantum code. PQC is simply an upgrade to our current mathematical libraries. It is classical code designed to withstand a quantum attack.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frid3q2wz1rxa4o0ogd15.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frid3q2wz1rxa4o0ogd15.png" width="800" height="272"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Post-Quantum Cryptography doesn’t require quantum physics. It is traditional software running on traditional devices, using smarter math.&lt;/em&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  3. What Actually Makes Math “Quantum-Safe”?
&lt;/h4&gt;

&lt;p&gt;Earlier, we saw that all Asymmetric encryption relies on a &lt;strong&gt;Trapdoor Function -&lt;/strong&gt; a math puzzle that is easy to do, but virtually impossible to reverse without a secret key.&lt;/p&gt;

&lt;p&gt;Our current trapdoors are based on factoring prime numbers (RSA) or drawing lines through curves (ECC). We also learned that Shor’s Algorithm gives quantum computers a magical “shortcut” to solve these specific puzzles instantly, bypassing the need to guess.&lt;/p&gt;

&lt;p&gt;Therefore, Post-Quantum Cryptography is simply the global search for &lt;strong&gt;new mathematical trapdoors that have no quantum shortcuts.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For an algorithm to be considered “Post-Quantum,” it must meet one strict requirement: &lt;strong&gt;Brute force must be the only way to break it, even if you own a quantum computer.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If a quantum computer is forced to guess the answer one by one, rather than using a clever mathematical shortcut, it will take billions of years to break the lock, just like a classical computer.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Analogy: The Sudoku vs. The Labyrinth
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Current Crypto (RSA/ECC) is like a Sudoku puzzle:&lt;/strong&gt; To a classical computer, it looks incredibly difficult. But a quantum computer possesses a mathematical formula that instantly solves any Sudoku puzzle without guessing.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Post-Quantum Crypto is like a massive, multidimensional Labyrinth:&lt;/strong&gt; Even with a quantum computer’s immense processing power and wave-interference tricks, there is no mathematical formula to instantly find the center. The quantum computer is forced to wander the maze and check every single path, which takes too long to be a threat.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  4. The “Goldilocks” Engineering Problem
&lt;/h4&gt;

&lt;p&gt;If we just need harder math problems, why didn’t we upgrade years ago? Because cryptography engineers face an incredibly difficult balancing act. We call it the Goldilocks problem.&lt;/p&gt;

&lt;p&gt;To create a viable PQC algorithm for the internet, the math must be:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Hard for Classical Computers:&lt;/strong&gt; Hackers using normal laptops shouldn’t be able to break it.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Hard for Quantum Computers:&lt;/strong&gt; Hackers using futuristic quantum machines shouldn’t be able to break it.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Easy for Your Smartphone:&lt;/strong&gt; Here is the catch! The math must be light enough that a cheap, battery-powered Android phone can calculate the &lt;em&gt;forward&lt;/em&gt; direction of the trapdoor in milliseconds without draining the battery.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Finding a math problem that is simultaneously “impossible for a supercomputer to reverse” but “instant for a smartphone to create” is profoundly difficult.&lt;/p&gt;

&lt;p&gt;To make matters worse, as we invent these new mathematical labyrinths, the keys (the Public and Private keys) tend to be much larger than the ones we use today. A standard ECC key today is a tiny 256 bits. Some of the new PQC keys are tens of thousands of bits long.&lt;/p&gt;

&lt;p&gt;Engineers are currently fighting to optimize these algorithms so they don’t clog up the internet’s bandwidth.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhm527b54mbl3x5hjfnx2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhm527b54mbl3x5hjfnx2.png" width="800" height="373"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;PQC algorithms must perfectly balance extreme security against futuristic threats while remaining lightweight enough for everyday consumer devices.&lt;/em&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  5. PQC is Already Here: Real-World Applications
&lt;/h4&gt;

&lt;p&gt;You might think that PQC is just a theoretical academic exercise happening in university laboratories. It is not. The transition has already begun, and you are likely using PQC today without even realizing it.&lt;/p&gt;

&lt;p&gt;Because of the “Store Now, Decrypt Later” threat - where hackers save your encrypted data today to crack it tomorrow, major technology companies are actively deploying Post-Quantum algorithms right now.&lt;/p&gt;

&lt;p&gt;Here is how PQC is impacting the real world today:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Secure Messaging (Signal &amp;amp; Apple):&lt;/strong&gt; In late 2023, the Signal messaging app upgraded its protocol (the “PQXDH” protocol) to include Post-Quantum cryptography. In early 2024, Apple followed suit, upgrading iMessage with a new protocol called “PQ3.” Even if a quantum computer is built in 2035, it will not be able to read the iMessages you send today.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Web Browsing (Google Chrome &amp;amp; Cloudflare):&lt;/strong&gt; If you use Google Chrome to visit a website hosted by Cloudflare, your browser is likely performing a “Hybrid” TLS Handshake. It uses both our current math (ECC) and a new Post-Quantum math algorithm simultaneously to exchange keys.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;National Security:&lt;/strong&gt; The United States government has issued mandates requiring all federal agencies to migrate their critical systems to Post-Quantum Cryptography by the early 2030s.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The code is being written, the libraries are being updated, and the new vault doors are being installed while the bank is still open.&lt;/p&gt;

&lt;h4&gt;
  
  
  6. The Referee: The NIST Standardization Process
&lt;/h4&gt;

&lt;p&gt;You might be wondering: &lt;em&gt;Who decides which new mathematical maze we all use?&lt;/em&gt; If Apple invents their own math, and Google invents different math, the internet will fracture. Devices won’t be able to talk to each other securely.&lt;/p&gt;

&lt;p&gt;To prevent this, the &lt;strong&gt;National Institute of Standards and Technology (NIST)&lt;/strong&gt; in the United States stepped in to act as the global referee. In 2016, NIST announced a worldwide competition. They asked the smartest mathematicians and cryptographers on Earth to submit their best Post-Quantum algorithms.&lt;/p&gt;

&lt;p&gt;Over the course of eight years, these algorithms were subjected to brutal, global peer review. Hackers and academics spent years trying to crack each other’s submissions. Some algorithms were broken in days; others survived for years before a fatal flaw was found.&lt;/p&gt;

&lt;p&gt;Finally, in August 2024, NIST published the very first official, standardized Post-Quantum algorithms for the world to use. We will explore these specific algorithms in upcoming articles.&lt;/p&gt;

&lt;h4&gt;
  
  
  Summary
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;What it is:&lt;/strong&gt; Post-Quantum Cryptography (PQC) consists of new mathematical algorithms designed to be secure against both classical and quantum computers.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;What it is not:&lt;/strong&gt; It does not require quantum hardware. It is standard software running on standard silicon chips.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Goal:&lt;/strong&gt; To find new “Trapdoor functions” (mathematical mazes) that lack the specific shortcuts that quantum computers exploit.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Challenge:&lt;/strong&gt; Balancing unbreakable security with keys that are small and fast enough to run on everyday devices.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Reality:&lt;/strong&gt; It is already being deployed today in Google Chrome, Apple iMessage, and Signal to protect data from the “Store Now, Decrypt Later” threat.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  What’s Next?
&lt;/h4&gt;

&lt;p&gt;We now know &lt;em&gt;why&lt;/em&gt; we need PQC and the basic philosophy behind it. But as developers, we need to understand how the mechanics actually change.&lt;/p&gt;

&lt;p&gt;If we are throwing away prime numbers and elliptic curves, what exactly are we replacing them with?&lt;/p&gt;

&lt;p&gt;In the next article, &lt;strong&gt;How PQC Differs from Classical Cryptography&lt;/strong&gt; , we will do a side-by-side comparison. We will look at how the architecture of a secure connection changes when we introduce these massive new mathematical puzzle pieces, and what that means for network speed, key sizes, and everyday software development.&lt;/p&gt;




</description>
      <category>encryption</category>
      <category>cybersecurity</category>
      <category>postquantumcryptography</category>
      <category>quantumcomputing</category>
    </item>
    <item>
      <title>The Quantum Threat: How Quantum Computers Will Break Modern Cryptography</title>
      <dc:creator>Shreehari Menon</dc:creator>
      <pubDate>Fri, 27 Mar 2026 07:00:16 +0000</pubDate>
      <link>https://dev.to/shreehari_menon/the-quantum-threat-how-quantum-computers-will-break-modern-cryptography-1ddh</link>
      <guid>https://dev.to/shreehari_menon/the-quantum-threat-how-quantum-computers-will-break-modern-cryptography-1ddh</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj49yapjqjanstfst1qm3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj49yapjqjanstfst1qm3.png" width="800" height="447"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A simple, visual guide to qubits, interference, and Shor’s Algorithm - and why the encryption protecting the internet won’t survive.&lt;/em&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  1. Introduction: The Candle and the Lightbulb
&lt;/h4&gt;

&lt;p&gt;When people hear the term &lt;strong&gt;“&lt;em&gt;Quantum Computer&lt;/em&gt;”&lt;/strong&gt; they usually imagine a machine that looks and acts just like their current laptop, only a billion times faster. They imagine a super-powered processor that can play video games at infinite frame rates or download the entire internet in a second.&lt;/p&gt;

&lt;p&gt;This is the biggest misconception in modern technology.&lt;/p&gt;

&lt;p&gt;A quantum computer is not a “faster” normal computer. It is an entirely different type of machine.&lt;/p&gt;

&lt;p&gt;Think of it this way: You cannot build a lightbulb simply by building a bigger, better candle. A candle and a lightbulb both produce light, but the underlying physics they use to generate that light are completely different. A lightbulb can do things a candle could never do, like flash thousands of times a second to transmit data.&lt;/p&gt;

&lt;p&gt;Similarly, a quantum computer uses a fundamentally different set of rules to process information. For watching YouTube or typing a Word document, a quantum computer would actually be terrible. But for a very specific set of mathematical problems - specifically, the math problems that protect the entire internet (RSA and ECC) - quantum computers are the ultimate weapon.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Today, we are going to look under the hood of the quantum threat. We will skip the confusing physics equations and use simple analogies to understand exactly how these machines work and why they spell the end of classical cryptography.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h4&gt;
  
  
  2. The Core Difference: Bits vs. Qubits
&lt;/h4&gt;

&lt;p&gt;To understand quantum computing, we have to start at the absolute foundation of how computers store data.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Classical Bit (The Light Switch)
&lt;/h4&gt;

&lt;p&gt;Every computer you have ever used - from your smartphone to the massive servers at Google - runs on &lt;strong&gt;Bits&lt;/strong&gt;. A bit is like a simple light switch. It has exactly two states: it is either &lt;strong&gt;Off (0)&lt;/strong&gt; or &lt;strong&gt;On (1)&lt;/strong&gt;. Every photo, video, and text message is just millions of these 0's and 1's strung together.&lt;/p&gt;

&lt;p&gt;If a classical computer wants to solve a maze, it must act like a person walking through it. It checks one path (a specific combination of 0s and 1s), hits a dead end, resets, and tries the next path. It is incredibly fast, but it only ever exists in one state at a time.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Qubit (The Spinning Coin)
&lt;/h4&gt;

&lt;p&gt;Quantum computers do not use bits; they use &lt;strong&gt;Qubits&lt;/strong&gt; (Quantum Bits).&lt;/p&gt;

&lt;p&gt;Instead of a light switch, imagine a coin.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If you place a coin flat on a table, it is either Heads (1) or Tails (0). That is a classical bit.&lt;/li&gt;
&lt;li&gt;Now, imagine you flick the coin so it is &lt;strong&gt;spinning rapidly on the table&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;While the coin is spinning, is it Heads or Tails? It is neither, and yet it is a combination of both. It exists in a fluid state of probability. Only when you slap your hand down on the coin to stop it does it collapse into a definite Heads (1) or Tails (0).&lt;/p&gt;

&lt;p&gt;In quantum computing, this “spinning coin” state is called &lt;strong&gt;Superposition&lt;/strong&gt;. A qubit in superposition is not just a 0 or a 1; it holds the possibility of being both simultaneously until the exact moment you measure it.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk7ckzt718kd2dtyj5bt5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk7ckzt718kd2dtyj5bt5.png" width="800" height="395"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Classical bits are strictly 0 or 1. Qubits, while “spinning” in superposition, hold the probability of being both at the same time.&lt;/em&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  3. The Magic of Scaling: Exponential Power
&lt;/h4&gt;

&lt;p&gt;A single spinning coin isn’t very impressive. But what happens when you link them together?&lt;/p&gt;

&lt;p&gt;In classical computers, if you add more bits, the power grows linearly.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;2 bits can represent one of 4 possible states (00, 01, 10, 11) &lt;em&gt;at any given moment&lt;/em&gt;.&lt;/li&gt;
&lt;li&gt;3 bits can represent one of 8 possible states.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In a quantum computer, qubits can be mathematically linked together through a phenomenon called &lt;strong&gt;Entanglement&lt;/strong&gt;. When qubits are entangled in superposition, they hold &lt;em&gt;all&lt;/em&gt; possible states simultaneously.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;2 qubits in superposition hold 4 states &lt;em&gt;at once&lt;/em&gt;.&lt;/li&gt;
&lt;li&gt;3 qubits hold 8 states &lt;em&gt;at once&lt;/em&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;300 qubits&lt;/strong&gt; hold more states simultaneously than there are atoms in the observable universe.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This means a relatively small quantum computer can hold and manipulate a staggering amount of complex data in its “spinning” state - a feat that the world’s largest classical supercomputer could not achieve even if it were the size of a galaxy.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5u4dag1g72wsj0uxh5jb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5u4dag1g72wsj0uxh5jb.png" width="800" height="370"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Every time you add a single qubit, the processing capacity of the machine doubles. The power scales exponentially.&lt;/em&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  4. The Biggest Myth: “Trying Every Password at Once”
&lt;/h4&gt;

&lt;p&gt;Here is where most people get quantum computing wrong.&lt;/p&gt;

&lt;p&gt;Because a quantum computer can hold millions of combinations simultaneously, people assume it cracks passwords by just “trying every combination at once” and picking the right one.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This is mathematically false.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Think back to the spinning coin. While it is spinning, it holds all possibilities. But to get an answer out of the computer, you have to “slap your hand down” and measure it. When you stop the spin, the superposition collapses, and the machine spits out a single, random combination. If you just measured it immediately, it would give you garbage.&lt;/p&gt;

&lt;p&gt;So, how does it actually solve a problem? It uses &lt;strong&gt;Interference&lt;/strong&gt;.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Noise-Canceling Headphone Analogy
&lt;/h4&gt;

&lt;p&gt;Have you ever used noise-canceling headphones on an airplane? They don’t block sound physically. They listen to the roar of the airplane engine, create an exact opposite sound wave, and play it into your ear. The two waves collide and cancel each other out, leaving silence. This is called &lt;em&gt;Destructive Interference&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Conversely, if two waves peak at the same time, they amplify each other. This is &lt;em&gt;Constructive Interference&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;A quantum computer acts like a giant set of noise-canceling headphones for mathematics. When a quantum programmer writes an algorithm, they choreograph the spinning qubits so that:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;All the &lt;strong&gt;wrong answers&lt;/strong&gt; create waves that crash into each other and cancel out (Destructive Interference).&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;correct answer&lt;/strong&gt; creates waves that align and amplify (Constructive Interference).&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;By the time you “slap your hand down” to measure the qubits, all the wrong possibilities have been silenced, and the only possibility left standing is the correct answer.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft6tl9lrkdcjt0lkcbylq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft6tl9lrkdcjt0lkcbylq.png" width="800" height="367"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Quantum algorithms use interference to silence incorrect answers and amplify the correct one before the measurement happens.&lt;/em&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  5. Why This Breaks Cryptography (Shor’s Algorithm)
&lt;/h4&gt;

&lt;p&gt;Now, let’s connect this back to cryptography. Why is this specific “noise-canceling” machine so dangerous to the internet?&lt;/p&gt;

&lt;p&gt;Earlier, we had learned that RSA encryption relies on multiplying two giant prime numbers. Factoring that massive number back into its original primes is a nightmare for classical computers because there is no clear pattern; a classical computer just has to guess over and over.&lt;/p&gt;

&lt;p&gt;However, mathematicians discovered that factoring prime numbers is fundamentally tied to finding hidden, repeating patterns (called “periods”) in massive datasets.&lt;/p&gt;

&lt;p&gt;Classical computers are terrible at finding hidden patterns in a sea of noise. But quantum computers, using the wave interference we just described, are the ultimate pattern-finding machines.&lt;/p&gt;

&lt;p&gt;In 1994, Peter Shor wrote a quantum algorithm that uses interference to amplify the exact hidden pattern that reveals the prime numbers of an RSA key.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A classical computer would take 300 trillion years to guess the primes.&lt;/li&gt;
&lt;li&gt;A quantum computer running Shor’s Algorithm sets up the waves, lets them interfere, and outputs the exact prime numbers in a few minutes.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Once it has the prime numbers, it has your Private Key. Once it has your Private Key, your cryptography is broken.&lt;/p&gt;

&lt;h4&gt;
  
  
  6. The Reality Check: Where Are We Now?
&lt;/h4&gt;

&lt;p&gt;If quantum computers are so powerful, why hasn’t the internet collapsed yet?&lt;/p&gt;

&lt;p&gt;Because building a quantum computer is one of the hardest engineering challenges in human history. Qubits are incredibly fragile “divas.”&lt;/p&gt;

&lt;p&gt;For a qubit to stay in that magical “spinning coin” state (Superposition), it must be isolated from the entire universe. A microscopic fluctuation in temperature, a stray magnetic field, or even a tiny vibration can cause the qubit to accidentally collapse and lose its data. This fatal error is called &lt;strong&gt;Decoherence&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;To prevent this, quantum processors are suspended inside massive golden chandeliers (called dilution refrigerators) that cool the chip to a fraction of a degree above absolute zero - colder than deep space.&lt;/p&gt;

&lt;p&gt;Currently, we can build quantum computers with a few hundred “noisy” qubits. But to run Shor’s algorithm and break a modern 2048-bit RSA key, experts estimate we will need a machine with millions of highly stable, error-corrected qubits.&lt;/p&gt;

&lt;p&gt;We are not there yet. Most experts predict we are anywhere from 10 to 15 years away from a machine capable of breaking the internet (often called “Q-Day”). But as we learned last week, because hackers are stealing and storing encrypted data today, the clock has already run out.&lt;/p&gt;

&lt;h4&gt;
  
  
  Summary
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Qubits vs. Bits:&lt;/strong&gt; Classical bits are strictly 0 or 1. Qubits can exist in a fluid state of both 0 and 1 simultaneously (Superposition).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Entanglement:&lt;/strong&gt; Linking qubits allows their computing power to scale exponentially, handling massive amounts of complex data at once.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Interference:&lt;/strong&gt; Quantum computers don’t just “guess everything at once.” They use wave interference to cancel out wrong answers and amplify the correct one.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Cryptography Killer:&lt;/strong&gt; Shor’s Algorithm uses this interference to perfectly isolate the hidden math patterns behind RSA and ECC, breaking them in minutes.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Engineering Hurdle:&lt;/strong&gt; Qubits are fragile. Building a large-scale, error-free quantum computer requires extreme cooling and isolation, keeping us safe… for now.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  What’s Next:
&lt;/h4&gt;

&lt;p&gt;Now that you know how classical cryptography works and why it is fundamentally broken by quantum physics.&lt;/p&gt;

&lt;p&gt;It’s time to fight back.&lt;/p&gt;

&lt;p&gt;In the upcoming articles, let’s explore &lt;strong&gt;Post-Quantum Cryptography&lt;/strong&gt;. We will introduce the brilliant new mathematical concepts that scientists have designed to replace RSA and ECC. We will look at math puzzles so complex and chaotic that even a fully armed quantum computer gets lost trying to solve them.&lt;/p&gt;




</description>
      <category>cryptography</category>
      <category>quantumcomputing</category>
      <category>encryption</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Why Current Cryptography Will Eventually Break</title>
      <dc:creator>Shreehari Menon</dc:creator>
      <pubDate>Fri, 20 Mar 2026 05:59:10 +0000</pubDate>
      <link>https://dev.to/shreehari_menon/why-current-cryptography-will-eventually-break-53cg</link>
      <guid>https://dev.to/shreehari_menon/why-current-cryptography-will-eventually-break-53cg</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw5bq3u9xteukq6qbu69l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw5bq3u9xteukq6qbu69l.png" width="800" height="370"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Store Now, Decrypt Later: The Silent Countdown to Cryptographic Collapse&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  1. Introduction: The Invisible Vacuum Cleaner
&lt;/h4&gt;

&lt;p&gt;Right now, as you read this article, vast amounts of encrypted internet traffic may be secretly recorded and stored in massive data centers around the world.&lt;/p&gt;

&lt;p&gt;Intelligence agencies and state-sponsored hackers could be actively intercepting secure communications: military blueprints, diplomatic cables, corporate trade secrets, and even private citizens’ encrypted messaging backups.&lt;/p&gt;

&lt;p&gt;But there is a catch: &lt;strong&gt;they cannot read any of it.&lt;/strong&gt; The data is secured using the robust RSA and ECC algorithms that we had discussed in our previous articles. To these hackers, the data is currently just a useless, garbled mess of ciphertext.&lt;/p&gt;

&lt;p&gt;So, why are they spending billions of dollars to store exabytes of unreadable data?&lt;/p&gt;

&lt;p&gt;Because they are playing a long game called &lt;strong&gt;“Store Now, Decrypt Later”&lt;/strong&gt; (SNDL), also known as &lt;strong&gt;“Harvest Now, Decrypt Later”.&lt;/strong&gt; They know a technological earthquake is coming. They are betting that within the next decade or two, a machine will be built that can shatter RSA and ECC instantly. When that day comes, they will simply open their vaults, run the decryption program, and read all the secrets of the past twenty years.&lt;/p&gt;

&lt;p&gt;Today, we are going to explore exactly why our current cryptographic shields have an expiration date, how the math is going to be beaten, and why the tech industry is racing against the clock to replace it.&lt;/p&gt;

&lt;h4&gt;
  
  
  2. The Illusion of “Unbreakable”
&lt;/h4&gt;

&lt;p&gt;To understand why our cryptography will break, we first need to confront an uncomfortable truth: &lt;strong&gt;RSA and ECC are not perfectly secure.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In cryptography, there is a difference between being &lt;em&gt;Information-Theoretically Secure&lt;/em&gt; (mathematically impossible to break, no matter how much computing power you have) and being &lt;em&gt;Computationally Secure&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Almost the entire modern internet is only computationally secure. This means the lock &lt;em&gt;can&lt;/em&gt; be picked; it just takes a ridiculously long time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;RSA&lt;/strong&gt; relies on the extreme difficulty of factoring massive prime numbers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ECC&lt;/strong&gt; relies on the extreme difficulty of reverse-engineering a point bouncing around an elliptic curve.&lt;/p&gt;

&lt;p&gt;These algorithms rely on the assumption that a hacker must use &lt;strong&gt;Brute Force&lt;/strong&gt;. Brute force means guessing the answer, checking if it works, and trying again if it fails.&lt;/p&gt;

&lt;p&gt;Because classical computers (the laptops, servers, and supercomputers we use today) process tasks sequentially - one after another - brute-forcing a 2048-bit RSA key would require a supercomputer to guess millions of times a second for a period longer than the age of the universe.&lt;/p&gt;

&lt;p&gt;Therefore, we deemed them “unbreakable.” We assumed the rules of computing would never change.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyxubicejh7snnidl5t70.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyxubicejh7snnidl5t70.png" width="800" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  3. The Math Shortcut: Shor’s Algorithm
&lt;/h4&gt;

&lt;p&gt;In 1994, a mathematician named Peter Shor published a research paper that sent shockwaves through the intelligence and cryptographic communities.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flq2517vuzy1fj3qsz37b.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flq2517vuzy1fj3qsz37b.png" width="800" height="534"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Peter Williston Shor (born August 14, 1959) is an American theoretical computer scientist known for his work on quantum computation&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Shor didn’t build a new computer. He just wrote an algorithm on a piece of paper. He proved mathematically that if a specific type of machine could ever be built, it wouldn’t need to use “Brute Force” to break RSA and ECC.&lt;/p&gt;

&lt;p&gt;Instead of guessing millions of times, Shor’s algorithm acts like a mathematical shortcut. It exploits the underlying structure of prime numbers and elliptic curves to find the Private Key in just a few logical steps.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Analogy: The Maze and the GPS
&lt;/h4&gt;

&lt;p&gt;Imagine you are dropped into a massive, complex maze.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;The Classical Computer (Brute Force):&lt;/strong&gt; You have to walk down a path. If you hit a dead end, you walk all the way back, make a chalk mark, and try the next path. You do this sequentially. It takes years to map the whole maze and find the exit.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Shor’s Algorithm:&lt;/strong&gt; It doesn’t walk the maze. It mathematically lifts you into the air, gives you a GPS satellite view of the entire maze at once, and instantly highlights the single correct path to the exit.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Shor proved that the “unbreakable” math of RSA and ECC was actually quite fragile if you looked at it from a different dimension. There was only one problem: the machine required to run Shor’s algorithm didn’t exist in 1994. It required a &lt;strong&gt;Quantum Computer&lt;/strong&gt;.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;We will explore what a quantum computer actually is in the next article, but for now, just know that it is a machine capable of running Shor’s mathematical shortcut.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fymnjokipve5mwb9bbunz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fymnjokipve5mwb9bbunz.png" width="800" height="352"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Shor’s Algorithm doesn’t guess the password; it calculates it directly by exploiting the math behind RSA and ECC.&lt;/em&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  4. The Cryptographic Fallout: What Survives?
&lt;/h4&gt;

&lt;p&gt;When a cryptographically relevant quantum computer is finally built and turned on, the internet will not instantly explode. However, the fundamental tools we rely on will be cleanly divided into two categories: &lt;strong&gt;Broken&lt;/strong&gt; and  &lt;strong&gt;Safe&lt;/strong&gt;.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Casualties (What Breaks)
&lt;/h4&gt;

&lt;p&gt;Everything relying on &lt;strong&gt;Asymmetric Cryptography&lt;/strong&gt; (Public/Private Keys) will fail completely.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;RSA:&lt;/strong&gt; Broken.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;ECC (Elliptic Curves):&lt;/strong&gt; Broken.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Digital Signatures:&lt;/strong&gt; Broken.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;TLS Handshakes:&lt;/strong&gt; Broken.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;The Real-World Impact:&lt;/strong&gt; If Digital Signatures are broken, a hacker could forge Apple’s signature, send a malicious software update to your iPhone, and your phone would happily install it, thinking it came directly from Apple headquarters. Hackers could forge banking certificates, rendering the “Green Padlock” in your browser meaningless. Furthermore, the entire architecture of blockchains and cryptocurrencies like Bitcoin would collapse, as the digital signatures proving ownership of wallets could be easily forged.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Survivors (What Stays Safe)
&lt;/h4&gt;

&lt;p&gt;Surprisingly, &lt;strong&gt;Symmetric Cryptography&lt;/strong&gt; (like AES) and &lt;strong&gt;Hashing&lt;/strong&gt; (like SHA-256) will largely survive the quantum revolution.&lt;/p&gt;

&lt;p&gt;While quantum computers have another algorithm ( &lt;strong&gt;&lt;em&gt;Grover’s Algorithm&lt;/em&gt;&lt;/strong&gt; ) that can speed up the brute-forcing of Symmetric keys, it is not an instant shortcut like Shor’s. It merely halves the effectiveness of the key.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Real-World Fix:&lt;/strong&gt; To protect Symmetric encryption and Hashing against quantum computers, all developers have to do is double the key size.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;We upgrade our AES encryption from 128-bit keys to &lt;strong&gt;256-bit keys&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;We upgrade our Hashing from SHA-256 to &lt;strong&gt;SHA-384&lt;/strong&gt; or  &lt;strong&gt;SHA-512&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Once we double the sizes, our Symmetric tools are safe from quantum threats. The real crisis lies entirely in Asymmetric cryptography.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa5ip9vhqmkp0jf59rrpl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa5ip9vhqmkp0jf59rrpl.png" width="800" height="358"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;The Quantum threat specifically targets how we share keys and prove identity, not how we encrypt bulk data.&lt;/em&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  5. The “Y2Q” Problem: Why We Must Act Now
&lt;/h4&gt;

&lt;p&gt;If a large-scale quantum computer hasn’t been perfected yet, why are software engineers, banks, and governments panicking about it today? Why not wait until the machine is built?&lt;/p&gt;

&lt;p&gt;This deadline is often referred to as &lt;strong&gt;Y2Q (Years to Quantum)&lt;/strong&gt;. We must act now because of three colliding timelines:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;The SNDL Threat (Data Shelf-Life):&lt;/strong&gt; As mentioned in the introduction, hackers are storing data &lt;em&gt;today&lt;/em&gt;. If you are encrypting medical records or military secrets today, that data needs to remain secret for 25 to 50 years. If a quantum computer is built in 15 years, your data will be exposed before its secret shelf-life expires.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Embedded Hardcoded Systems:&lt;/strong&gt; Think about satellites launched into space, smart grids, or modern cars. Many of these IoT (Internet of Things) devices have RSA or ECC cryptography hardcoded into their silicon chips. They cannot be easily updated with a software patch. We must start manufacturing them with quantum-safe chips &lt;em&gt;now&lt;/em&gt; before they are deployed into the field for twenty-year lifespans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Migration Marathon:&lt;/strong&gt; Upgrading the entire internet is like rebuilding an airplane while it is in flight. The last major cryptographic upgrade took the industry nearly two decades to fully implement.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If we wait for the quantum computer to be built before we start migrating, we will be decades too late.&lt;/p&gt;

&lt;h4&gt;
  
  
  Summary
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Store Now, Decrypt Later:&lt;/strong&gt; Adversaries are archiving encrypted data today to decrypt it when quantum tech matures.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Classical Security:&lt;/strong&gt; RSA and ECC are secure today only because classical computers must “brute force” the answer, which takes millions of years.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Shor’s Algorithm:&lt;/strong&gt; A mathematical shortcut discovered in 1994 that allows quantum computers to crack RSA and ECC in minutes without guessing.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Fallout:&lt;/strong&gt; Asymmetric cryptography (RSA/ECC) will be completely broken. Symmetric cryptography (AES) and Hashing remain mostly safe if we use larger keys.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Urgency:&lt;/strong&gt; Because infrastructure takes decades to upgrade, and data must be kept secret for decades, engineers must begin migrating to Post-Quantum cryptography immediately.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  What’s Next?
&lt;/h4&gt;

&lt;p&gt;We keep blaming this looming catastrophe on “Quantum Computers.” But what exactly are they? Do they just have faster processors? Do they have more RAM?&lt;/p&gt;

&lt;p&gt;In the upcoming article, we will briefly lift the veil on the machines themselves. We will completely skip the confusing physics equations and use simple analogies to explain exactly what makes a quantum bit (qubit) different from a regular bit, and why they are the perfect weapon for destroying RSA.&lt;/p&gt;




</description>
      <category>postquantumcryptography</category>
      <category>cryptography</category>
      <category>encryption</category>
      <category>quantumcomputing</category>
    </item>
    <item>
      <title>ECC Explained: The Geometry Powering Modern Digital Security</title>
      <dc:creator>Shreehari Menon</dc:creator>
      <pubDate>Fri, 13 Mar 2026 06:25:11 +0000</pubDate>
      <link>https://dev.to/shreehari_menon/ecc-explained-the-geometry-powering-modern-digital-security-1k82</link>
      <guid>https://dev.to/shreehari_menon/ecc-explained-the-geometry-powering-modern-digital-security-1k82</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F31n1yl0v2v2j0ges32tz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F31n1yl0v2v2j0ges32tz.png" width="800" height="447"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The Lightweight Encryption Revolution Enabling Faster, Safer Digital Communication&lt;/em&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  1. Introduction: The Smartphone Battery Crisis
&lt;/h4&gt;

&lt;p&gt;Earlier, we explored the mathematical magic of RSA. For decades, RSA was the undisputed king of internet security. Whenever your computer needed to securely swap a password or verify a digital certificate, it relied on the difficulty of factoring massive prime numbers.&lt;/p&gt;

&lt;p&gt;But by the late 2000s, a new problem emerged: &lt;em&gt;the smartphone revolution&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;RSA works brilliantly on desktop computers plugged into a wall. However, as we learned, to keep hackers at bay, RSA keys had to grow larger and larger. By 2010, a standard RSA key was 2048 bits long - a number so massive it would take pages to write out.&lt;/p&gt;

&lt;p&gt;Asking a tiny, battery-powered 3G smartphone to perform complex “clock math” with 2048-bit numbers every time it loaded a secure website was a disaster. It drained batteries, slowed down web browsing, and required too much memory. The tech industry desperately needed a new cryptographic tool. They needed an algorithm that provided the exact same unbreakable “Asymmetric” (Public/Private Key) security as RSA, but was radically lighter, faster, and more efficient.&lt;/p&gt;

&lt;p&gt;The answer wasn’t found in prime numbers. It was found in geometry.&lt;/p&gt;

&lt;p&gt;It is called &lt;strong&gt;Elliptic Curve Cryptography (ECC)&lt;/strong&gt;, and today, it is the technology secretly securing your iMessages, your Bitcoin wallet, and almost every modern website you visit.&lt;/p&gt;

&lt;h4&gt;
  
  
  2. Moving from Numbers to Shapes
&lt;/h4&gt;

&lt;p&gt;To understand ECC, we have to stop thinking about multiplying numbers (like we did in RSA) and start thinking about drawing lines on a graph.&lt;/p&gt;

&lt;p&gt;An &lt;strong&gt;Elliptic Curve&lt;/strong&gt; is a specific type of mathematical curve. If you graph it on a piece of paper, it looks a bit like a sideways bell or a lasso resting on its side.&lt;/p&gt;

&lt;p&gt;While the exact algebraic equation ( &lt;strong&gt;y² = x³ + ax + b&lt;/strong&gt; ) isn’t important for us, one visual property of this curve is absolutely critical: &lt;strong&gt;Horizontal Symmetry&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;If you draw a horizontal line right through the middle of the curve (the x-axis), the top half of the curve is a perfect mirror image of the bottom half. If you find a point on the top of the curve and drop a line straight down, you will always hit another perfectly matching point on the bottom of the curve.&lt;/p&gt;

&lt;p&gt;This simple property of symmetry is the engine that drives modern cryptography.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F25lrqzc0l732le1aimuh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F25lrqzc0l732le1aimuh.png" width="800" height="719"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;An Elliptic Curve is perfectly symmetrical. Every point on the top has a mirror counterpart directly below it.&lt;/em&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  3. The ECC Trapdoor: A Game of Cosmic Billiards
&lt;/h4&gt;

&lt;p&gt;Remember our golden rule from last week: All Asymmetric cryptography requires a &lt;strong&gt;Trapdoor Function -&lt;/strong&gt; a process that is very easy to do in one direction, but mathematically impossible to reverse without a secret key.&lt;/p&gt;

&lt;p&gt;In RSA, the trapdoor was multiplying prime numbers (easy to multiply, hard to factor). In ECC, the trapdoor is a geometric game of billiards. Cryptographers call it “Point Addition,” but it is much easier to understand visually.&lt;/p&gt;

&lt;h4&gt;
  
  
  How to Play Elliptic Billiards
&lt;/h4&gt;

&lt;p&gt;Imagine the curve is the bumper of a strangely shaped billiard table.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;The Starting Point:&lt;/strong&gt; We all agree on a starting dot on the curve. Let’s call it Point A.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Shot:&lt;/strong&gt; You take a pool cue and hit the ball from Point A. It travels in a perfectly straight line along a tangent until it smacks into the edge of the curve at a new spot.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Reflection (Symmetry):&lt;/strong&gt; Because of the curve’s magical mirror property, the ball immediately drops straight down (or straight up) to rest on the mirror-image point on the opposite side of the curve. We will call this resting spot Point B.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Repeat:&lt;/strong&gt; Now, you line up a shot from Point A to Point B. The ball travels in a straight line, hits the curve, reflects vertically, and lands at Point C.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;You can repeat this process as many times as you want. Shoot, hit the curve, reflect. Shoot, hit the curve, reflect. The ball bounces wildly all over the graph.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Trapdoor: The “Discrete Logarithm” Problem
&lt;/h4&gt;

&lt;p&gt;Here is where the brilliant security of ECC comes in.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Forward Direction (Easy):&lt;/strong&gt; If a computer knows the starting point, and I tell it to “bounce the ball 5 million times,” the computer can calculate exactly where the ball will end up in a fraction of a millisecond.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Reverse Direction (Impossible):&lt;/strong&gt; Imagine I walk into the room after you’ve finished playing. I see the starting point, and I see the ball resting at its final point. I ask you: &lt;em&gt;“How many times did you bounce the ball to get there?”&lt;/em&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There is no mathematical formula to figure that out. The only way I can find the answer is to grab a pool cue, start at the beginning, and manually recreate every single bounce, counting them one by one until I hit your final spot.&lt;/p&gt;

&lt;p&gt;If you bounced the ball a small number of times, I could figure it out. But what if you bounced it a number of times equal to the number of atoms in the universe? It would take my supercomputers millions of years to count the bounces.&lt;/p&gt;

&lt;p&gt;This irreversible geometric puzzle is known as the &lt;strong&gt;Elliptic Curve Discrete Logarithm Problem (ECDLP)&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6w4m9y1gaplckml7fy3i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6w4m9y1gaplckml7fy3i.png" width="800" height="684"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;“Adding” points on a curve: Draw a line through two points, find where it hits the curve, and reflect it. Repeat this millions of times, and the path becomes impossible to reverse-engineer.&lt;/em&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  4. Generating Keys: Lighter, Faster, Stronger
&lt;/h4&gt;

&lt;p&gt;Now that we understand the trapdoor, generating our Public and Private Keys is incredibly simple.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;The Private Key:&lt;/strong&gt; This is your secret. Your Private Key is simply &lt;strong&gt;the number of times you bounced the ball&lt;/strong&gt;. It is just a massive, random number (e.g: 9,482,103,456…). You keep this safely hidden on your device.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Public Key:&lt;/strong&gt; This is what you share with the world. Your Public Key is simply the &lt;strong&gt;final resting coordinate&lt;/strong&gt; of the ball on the graph (e.g: &lt;strong&gt;X = 45, Y = 89&lt;/strong&gt; ).&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;You can publish that final coordinate on the internet. Hackers can stare at it all day long, but because of the trapdoor, they cannot reverse-engineer the coordinate to figure out your secret number of bounces.&lt;/p&gt;

&lt;h4&gt;
  
  
  The Massive Advantage of ECC: Key Size
&lt;/h4&gt;

&lt;p&gt;Why did this save the smartphone? Because the “Billiard Bounce” math is significantly harder to reverse-engineer than RSA’s “Prime Number” math.&lt;/p&gt;

&lt;p&gt;Because the math is harder to crack, we don’t need giant keys to be safe.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;To get a baseline level of modern security using &lt;strong&gt;RSA&lt;/strong&gt; , you need a key that is &lt;strong&gt;3072 bits&lt;/strong&gt;  long.&lt;/li&gt;
&lt;li&gt;To get the &lt;em&gt;exact same&lt;/em&gt; level of unbreakable security using &lt;strong&gt;ECC&lt;/strong&gt; , you only need a key that is &lt;strong&gt;256 bits&lt;/strong&gt;  long.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;ECC keys are roughly &lt;strong&gt;10 times smaller&lt;/strong&gt; than RSA keys.&lt;/p&gt;

&lt;p&gt;Smaller keys mean less data to transmit over Wi-Fi, dramatically less CPU power required to lock and unlock messages, and significantly longer battery life for mobile devices and IoT (Internet of Things) sensors.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fur7f7bc1uhd9683y9hq8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fur7f7bc1uhd9683y9hq8.png" width="800" height="516"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  5. Where You Will See ECC Today
&lt;/h4&gt;

&lt;p&gt;Because of its elegance and efficiency, ECC has quietly taken over the digital world over the last decade. As a developer, you will encounter it constantly:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Cryptocurrency:&lt;/strong&gt; Bitcoin and Ethereum do not use RSA. They exclusively use a specific elliptic curve called &lt;strong&gt;secp256k1&lt;/strong&gt; to generate your crypto wallet addresses and digitally sign your transactions.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Modern Web Browsing:&lt;/strong&gt; When you perform a TLS Handshake to securely browse a website, modern servers strongly prefer an algorithm called &lt;strong&gt;ECDHE&lt;/strong&gt; (Elliptic Curve Diffie-Hellman Ephemeral) to swap symmetric keys instantly.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Secure Messaging:&lt;/strong&gt; Apps like Signal, WhatsApp, and Apple’s iMessage use Elliptic Curves to verify identities and establish End-to-End Encryption on your phone without draining your battery.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  6. The Impending Catch
&lt;/h4&gt;

&lt;p&gt;ECC is a masterpiece of modern mathematics. It is elegant, fast, and currently unbreakable by any traditional supercomputer on Earth.&lt;/p&gt;

&lt;p&gt;However, there is a dark cloud on the horizon.&lt;/p&gt;

&lt;p&gt;Remember how we said ECC is mathematically harder to crack than RSA? That is only true for &lt;em&gt;classical&lt;/em&gt; computers - the laptops, servers, and smartphones we use today.&lt;/p&gt;

&lt;p&gt;As we will explore soon, the world’s leading physicists and engineers are currently building &lt;strong&gt;Quantum Computers&lt;/strong&gt;. These futuristic machines operate on entirely different laws of physics.&lt;/p&gt;

&lt;p&gt;Unfortunately for us, the very thing that makes ECC so great - its tiny, efficient 256-bit key size - makes it a massive vulnerability against quantum machines. An algorithm called &lt;em&gt;Shor’s Algorithm&lt;/em&gt; can solve the Elliptic Curve “billiard puzzle” almost effortlessly. In fact, experts predict that a quantum computer will be able to break ECC &lt;em&gt;easier and faster&lt;/em&gt; than it can break the bulky, old-school RSA keys.&lt;/p&gt;

&lt;p&gt;The ultimate shield we built for the mobile era is fundamentally vulnerable to the next era of computing.&lt;/p&gt;

&lt;h4&gt;
  
  
  Summary
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;The Problem:&lt;/strong&gt; RSA keys grew too large and computationally heavy for modern smartphones and IoT devices.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Solution:&lt;/strong&gt; Elliptic Curve Cryptography (ECC) uses the geometry of symmetric curves instead of prime numbers.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Trapdoor:&lt;/strong&gt; Bouncing a point around an elliptic curve (Point Addition) is easy to calculate forward, but impossible to trace backward to find the number of bounces.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Keys:&lt;/strong&gt; The &lt;em&gt;Private Key&lt;/em&gt; is the number of bounces. The &lt;em&gt;Public Key&lt;/em&gt; is the final coordinate on the graph.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Benefit:&lt;/strong&gt; A 256-bit ECC key offers the same security as a 3072-bit RSA key, saving massive amounts of battery and processing power.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Reality:&lt;/strong&gt; It is the standard for Bitcoin, Apple iMessage, and modern HTTPS.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  What’s Next?
&lt;/h4&gt;

&lt;p&gt;We have now covered the foundations of modern internet security. You understand Encryption, Hashing, Signatures, Certificates, RSA, and ECC.&lt;/p&gt;

&lt;p&gt;But this entire foundation is built on a ticking time bomb.&lt;/p&gt;

&lt;p&gt;In the next article we’ll explore - &lt;strong&gt;Why Current Cryptography Will Eventually Break&lt;/strong&gt;. We will look at why RSA and ECC are living on borrowed time, explain the concept of “ &lt;strong&gt;&lt;em&gt;Harvest Now, Decrypt Later&lt;/em&gt;&lt;/strong&gt; ” and set the final stage before we officially dive into the Post-Quantum revolution.&lt;/p&gt;




</description>
      <category>cybersecurity</category>
      <category>technology</category>
      <category>blockchain</category>
      <category>cryptography</category>
    </item>
    <item>
      <title>RSA Explained: The Simple Math Behind Internet Security</title>
      <dc:creator>Shreehari Menon</dc:creator>
      <pubDate>Fri, 06 Mar 2026 07:02:59 +0000</pubDate>
      <link>https://dev.to/shreehari_menon/rsa-explained-the-simple-math-behind-internet-security-4fc2</link>
      <guid>https://dev.to/shreehari_menon/rsa-explained-the-simple-math-behind-internet-security-4fc2</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi0d9qsuvr7xa3d7dsns3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi0d9qsuvr7xa3d7dsns3.png" width="800" height="447"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;From prime numbers to public keys - how RSA enables secure logins, encrypted communication, and digital signatures.&lt;/em&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;1. Introduction: The Billion-Dollar Math Problem&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Imagine you are a modern software developer. You sit down at your laptop, open your terminal, and type a simple command: &lt;a href="mailto:sshuser@server.com"&gt;sshuser@server.com&lt;/a&gt;. Instantly, you are securely logged into a server located halfway across the world. No one can spy on your connection, and the server knows exactly who you are without you ever having to type a password over the internet.&lt;/p&gt;

&lt;p&gt;How did this happen? It happened because of a mathematical breakthrough that occurred over forty years ago.&lt;/p&gt;

&lt;p&gt;Previously, we had learned about &lt;strong&gt;Asymmetric Encryption -&lt;/strong&gt; the magical “Public Mailbox” system where you use a Public Key to lock a message and a completely different Private Key to unlock it. It solved the ultimate problem of the internet: allowing two strangers to share a secret without ever meeting in person.&lt;/p&gt;

&lt;p&gt;But how do you actually &lt;em&gt;build&lt;/em&gt; a Public and Private key? How can two digital keys be mathematically linked so that one locks and the other unlocks, without the Public Key accidentally revealing the Private Key?&lt;/p&gt;

&lt;h4&gt;
  
  
  In 1977, three brilliant researchers — Ron &lt;strong&gt;R&lt;/strong&gt; ivest, Adi &lt;strong&gt;S&lt;/strong&gt; hamir, and Leonard &lt;strong&gt;A&lt;/strong&gt; dleman — published the answer. They named it  &lt;strong&gt;RSA&lt;/strong&gt;.
&lt;/h4&gt;

&lt;p&gt;Today, RSA remains one of the most widely used cryptographic algorithms on the planet.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In this article, we will ignore the complex academic equations and just look at the simple, beautiful intuition behind how RSA works.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h4&gt;
  
  
  2. The Core Concept: The Trapdoor Function
&lt;/h4&gt;

&lt;p&gt;To build a Public/Private key system, cryptographers needed to invent a very specific type of mathematical algorithm called a &lt;strong&gt;Trapdoor Function&lt;/strong&gt;.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;A Trapdoor Function is a math problem that is incredibly easy to calculate in one direction, but virtually impossible to reverse - &lt;em&gt;unless&lt;/em&gt; you possess a secret piece of information (the trapdoor).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Imagine I hand you a bucket of yellow paint and a bucket of blue paint. I ask you to mix them together to create a specific shade of green.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Forward Direction (Easy)&lt;/em&gt;: You pour some amount of yellow paint and some amount of blue paint into a bucket and stir them together. In a few seconds, you have a particular shade of green.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Reverse Direction (Hard)&lt;/em&gt;: Now imagine I hand you only the final bucket of green paint and ask you to determine exactly how much yellow paint and how much blue paint were used to create that precise shade.&lt;/p&gt;

&lt;p&gt;Was it 50% yellow and 50% blue? Was it 60% yellow and 40% blue?&lt;br&gt;&lt;br&gt;
 Or some other exact combination?&lt;/p&gt;

&lt;p&gt;Determining the precise original proportions just by looking at the final color becomes extremely difficult.&lt;/p&gt;

&lt;p&gt;But what if you had a special chemical (the trapdoor) that could instantly reveal the exact proportions of yellow and blue used to create the shade? That secret chemical would make the impossible task suddenly easy.&lt;/p&gt;

&lt;p&gt;That is the essence of a Trapdoor Function. In the digital world, RSA uses numbers instead of paint. Specifically, it uses &lt;strong&gt;Prime Numbers&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpazf8alhe7f6m5jesxq2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpazf8alhe7f6m5jesxq2.png" width="800" height="378"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;A Trapdoor Function is easy to compute forward, but impossible to reverse without a secret key.&lt;/em&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  3. The Secret Ingredients: Prime Numbers and Multiplication
&lt;/h4&gt;

&lt;p&gt;A prime number is a number that can only be divided cleanly by 1 and itself (like 2, 3, 5, 7, 11, 13…). Prime numbers are the fundamental “atoms” of mathematics.&lt;/p&gt;

&lt;p&gt;The entire security of RSA relies on one incredibly simple mathematical fact: &lt;strong&gt;&lt;em&gt;Multiplying two prime numbers together is very easy, but factoring the result back into the original primes is brutally difficult.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Let’s look at an example:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;The Easy Way (Multiplication):&lt;/strong&gt;
If I ask your computer to multiply &lt;strong&gt;7 x 13&lt;/strong&gt; , it instantly tells you the answer is  &lt;strong&gt;91&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Hard Way (Factoring):&lt;/strong&gt;
If I give you the number &lt;strong&gt;3127&lt;/strong&gt; and ask, &lt;em&gt;“Which two prime numbers did I multiply together to get this?”&lt;/em&gt; you will have to guess and check for a while. (The answer is &lt;strong&gt;53 x 59&lt;/strong&gt; ).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Now, imagine we don’t use small numbers like 53. Imagine we use prime numbers that are &lt;strong&gt;300 digits long&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;If you multiply two 300-digit prime numbers together, a standard laptop can calculate the 600-digit answer in a fraction of a millisecond.&lt;/p&gt;

&lt;p&gt;But if you give that 600-digit answer to a room full of supercomputers and ask them to find the original two prime numbers, it would take them millions of years of continuous guessing.&lt;/p&gt;

&lt;h4&gt;
  
  
  4. How RSA Generates Keys (Step-by-Step)
&lt;/h4&gt;

&lt;p&gt;Here is how a developer’s computer uses this prime number math to generate a Public and Private Key. (We will use small variables to keep it simple).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1: Pick the Secret Ingredients&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Your computer secretly chooses two massive prime numbers. We will call them &lt;strong&gt;P&lt;/strong&gt; and &lt;strong&gt;Q&lt;/strong&gt;. &lt;em&gt;(These are the yellow and blue paint - these must be kept absolutely secret. They are the trapdoor!)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2: Create the Public Canvas&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Your computer multiplies them together: &lt;strong&gt;N = P x Q&lt;/strong&gt;. The resulting massive number &lt;strong&gt;N&lt;/strong&gt; , is called the &lt;em&gt;Modulo&lt;/em&gt;. &lt;em&gt;(This is the green paint, you publish&lt;/em&gt; &lt;strong&gt;N&lt;/strong&gt; &lt;em&gt;to the world. It becomes the core part of your Public Key.)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3: Derive the Locking and Unlocking Keys&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Using some clever math (specifically, Euler’s Totient function, which we will skip for simplicity), your computer uses the secret primes ( &lt;strong&gt;P&lt;/strong&gt; and &lt;strong&gt;Q&lt;/strong&gt; ) to generate two more numbers:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;e (The Public Exponent):&lt;/strong&gt; This is used for encrypting.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;d (The Private Exponent):&lt;/strong&gt; This is used for decrypting.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;The Final Result:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Your &lt;strong&gt;Public Key&lt;/strong&gt; is made of the numbers &lt;strong&gt;(N&lt;/strong&gt; and &lt;strong&gt;e)&lt;/strong&gt;. You send this to anyone who wants to talk to you.&lt;br&gt;&lt;br&gt;
Your &lt;strong&gt;Private Key&lt;/strong&gt; is the number &lt;strong&gt;(d)&lt;/strong&gt;. You keep this hidden on your computer.&lt;/p&gt;

&lt;p&gt;Because a hacker only knows &lt;strong&gt;N&lt;/strong&gt; (the 600-digit number), they cannot figure out &lt;strong&gt;P&lt;/strong&gt; and &lt;strong&gt;Q&lt;/strong&gt;. Because they don’t know &lt;strong&gt;P&lt;/strong&gt; and &lt;strong&gt;Q&lt;/strong&gt; , they cannot calculate &lt;strong&gt;d&lt;/strong&gt; (your Private Key). The math is locked!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fat5m9tbq8y6e6y2xdchf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fat5m9tbq8y6e6y2xdchf.png" width="800" height="394"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;The massive public number ’N’ is derived from ‘P’ and ‘Q’. But without knowing ‘P’ and ‘Q’, a hacker cannot build the Private Key.&lt;/em&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  5. Clock Math: How the Locking Actually Works
&lt;/h4&gt;

&lt;p&gt;So, Bob has Alice’s Public Key ( &lt;strong&gt;N&lt;/strong&gt; and &lt;strong&gt;e&lt;/strong&gt; ). He wants to send her the secret number “ &lt;strong&gt;7&lt;/strong&gt; ”. How does he scramble it?&lt;/p&gt;

&lt;p&gt;RSA uses something called &lt;strong&gt;Modular Arithmetic&lt;/strong&gt; , which is essentially “&lt;em&gt;Clock Math&lt;/em&gt;”. If it is 10:00 AM, and you add 4 hours, it is not 14:00 AM. The clock “&lt;em&gt;wraps around&lt;/em&gt;” at 12, so the answer is 2:00 PM. In clock math, we say the “&lt;em&gt;modulo&lt;/em&gt;” is 12.&lt;br&gt;&lt;br&gt;
In RSA, the “clock size” is that massive public number  &lt;strong&gt;N&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;To Encrypt (Bob):&lt;/strong&gt; Bob takes his message, raises it to the power of the public key ( &lt;strong&gt;e&lt;/strong&gt; ), and wraps it around the massive clock ( &lt;strong&gt;N&lt;/strong&gt; ). The message spins around the clock millions of times and lands on a random-looking number. That random number is the &lt;strong&gt;Ciphertext&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;To Decrypt (Alice):&lt;/strong&gt; Because the message was spun around the clock using the Public Key, it is trapped. The only mathematical way to unwind it is to spin it forward a very specific, massive number of times until it perfectly resets to the original message. That exact number of spins is the Private Key ( &lt;strong&gt;d&lt;/strong&gt; ).&lt;br&gt;&lt;br&gt;
Alice applies her Private Key, the math unwinds, and the original message pops out!&lt;/p&gt;

&lt;h4&gt;
  
  
  6. Real-World Applications of RSA
&lt;/h4&gt;

&lt;p&gt;Where will you, as an engineer, actually encounter RSA today?&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;SSH (Secure Shell):&lt;/strong&gt; When developers connect to remote servers (like AWS or GitHub), they often generate an “RSA Keypair.” Your computer holds the Private Key, and you upload the Public Key to GitHub.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Digital Signatures:&lt;/strong&gt; RSA can be used in reverse. If you encrypt a file’s hash with your Private Key, anyone can use your Public Key to verify that &lt;em&gt;you&lt;/em&gt; signed it.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;PGP (Pretty Good Privacy):&lt;/strong&gt; Used for encrypting highly sensitive emails, often utilized by journalists and whistleblowers.&lt;/li&gt;
&lt;/ol&gt;

&lt;h4&gt;
  
  
  7. The Problem with RSA Today (Why it is Aging)
&lt;/h4&gt;

&lt;p&gt;RSA is beautiful, brilliant, and has secured the internet for four decades. However, it has a growing problem: &lt;strong&gt;Speed and Size&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Remember, the entire security of RSA relies on the fact that standard computers cannot factor the giant number &lt;strong&gt;N&lt;/strong&gt; back into &lt;strong&gt;P&lt;/strong&gt; and &lt;strong&gt;Q&lt;/strong&gt;. But computers are getting faster every single year.&lt;/p&gt;

&lt;p&gt;In the 1990s, a 512-bit &lt;strong&gt;N&lt;/strong&gt; was considered secure. By the 2000s, computers got faster, so we had to increase the key size to 1024 bits. Today, the standard is &lt;strong&gt;2048 bits&lt;/strong&gt; or even &lt;strong&gt;4096 bits&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;These keys are absolutely massive. Doing complex “clock math” with 4000-bit numbers requires a lot of CPU power. If every mobile phone had to do 4096-bit RSA math for every website it visited, battery life would drop. RSA is becoming too heavy for the modern, fast-paced mobile internet.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Furthermore, as we will discuss in upcoming articles, a Quantum Computer doesn’t need to guess. Through an algorithm called Shor’s Algorithm, a quantum computer can find the prime numbers&lt;/em&gt; &lt;strong&gt;P&lt;/strong&gt; &lt;em&gt;and&lt;/em&gt; &lt;strong&gt;Q&lt;/strong&gt; &lt;em&gt;almost instantly, completely destroying RSA.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;RSA&lt;/strong&gt; is an Asymmetric Encryption algorithm created in 1977.&lt;/li&gt;
&lt;li&gt;It relies on a &lt;strong&gt;Trapdoor Function&lt;/strong&gt; : easy to do one way, practically impossible to reverse without a secret.&lt;/li&gt;
&lt;li&gt;The “Trapdoor” in RSA is &lt;strong&gt;Prime Number Factorization&lt;/strong&gt;. Multiplying two giant primes ( &lt;strong&gt;P&lt;/strong&gt; &lt;em&gt;and&lt;/em&gt; &lt;strong&gt;Q&lt;/strong&gt; ) is easy; figuring out what they were from the result ( &lt;strong&gt;N&lt;/strong&gt; ) is nearly impossible for classical computers.&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;Public Key&lt;/strong&gt; ( &lt;strong&gt;N&lt;/strong&gt; , &lt;strong&gt;e&lt;/strong&gt; ) is used to spin a message around a mathematical clock.&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;Private Key&lt;/strong&gt; ( &lt;strong&gt;d&lt;/strong&gt; ) is the exact mathematical step required to unwind the clock and reveal the message.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Catch:&lt;/strong&gt; As computers get faster, RSA keys must become larger, making the algorithm slower and heavier for modern devices.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  What’s Next?
&lt;/h4&gt;

&lt;p&gt;Engineers realized over a decade ago that RSA was getting too bulky. We needed an algorithm that provided the exact same Asymmetric “Public/Private Key” magic, but with much smaller, faster keys.&lt;/p&gt;

&lt;p&gt;We found the answer by looking away from prime numbers and looking toward geometry.&lt;/p&gt;

&lt;p&gt;In &lt;strong&gt;the next article&lt;/strong&gt; we will explore the algorithm that currently secures your smartphone, modern web browsing, and cryptocurrencies like Bitcoin. We will see how drawing lines through curved graphs created a faster, leaner successor to RSA.&lt;/p&gt;




</description>
      <category>softwareengineering</category>
      <category>encryption</category>
      <category>computerscience</category>
      <category>cryptography</category>
    </item>
    <item>
      <title>How Internet Security Works: TLS, HTTPS &amp; Certificates</title>
      <dc:creator>Shreehari Menon</dc:creator>
      <pubDate>Fri, 27 Feb 2026 09:26:17 +0000</pubDate>
      <link>https://dev.to/shreehari_menon/how-internet-security-works-tls-https-certificates-41gd</link>
      <guid>https://dev.to/shreehari_menon/how-internet-security-works-tls-https-certificates-41gd</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmhphds7jv1hzmh1xynbv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmhphds7jv1hzmh1xynbv.png" width="800" height="386"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The Invisible Handshake: How Your Browser Proves a Website Isn’t an Imposter&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Introduction: The Postcard and the Imposter&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Imagine you are sitting in an airport terminal, waiting for your flight. You connect to the free “&lt;em&gt;Airport_Wi-Fi&lt;/em&gt;” network, open your browser, and type &lt;em&gt;bank.com&lt;/em&gt; to check your account balance.&lt;/p&gt;

&lt;p&gt;In the early days of the internet, the data you sent - like your username and password - traveled across the network exactly like a postcard in the mail. Anyone who handled the postcard along the way (the Wi-Fi router, the Internet Service Provider, or a hacker sitting two seats away) could flip it over and read your password in plain text. This was standard &lt;strong&gt;HTTP (Hypertext Transfer Protocol)&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;To fix this, engineers added encryption, creating &lt;strong&gt;HTTPS (Secure HTTP)&lt;/strong&gt;. Now, your postcard was placed inside an indestructible, locked steel box before it was sent over the Wi-Fi.&lt;/p&gt;

&lt;p&gt;Problem solved, right? Not exactly.&lt;/p&gt;

&lt;p&gt;As we learned previously, to lock that box, your browser needs the Bank’s &lt;strong&gt;Public Key&lt;/strong&gt;. So, your browser asks the network: &lt;em&gt;“Hey, who has the Public Key for bank.com?”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;But what if a hacker is running a fake Wi-Fi router? The hacker replies, &lt;em&gt;“I do! Here is the Public Key for bank.com.”&lt;/em&gt; Your browser, not knowing any better, uses the hacker’s key to lock the box containing your password. The hacker intercepts the box, opens it with their own Private Key, steals your password, and then forwards your request to the real bank so you never notice a thing.&lt;/p&gt;

&lt;p&gt;This is called a &lt;strong&gt;Man-in-the-Middle (MITM) attack&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;The encryption worked perfectly, but the &lt;em&gt;identity&lt;/em&gt; was faked. How does your computer actually know that the Public Key it receives belongs to the real Bank and not an imposter?&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;This is the ultimate problem of internet security. Today, we will learn how the internet solves it using &lt;strong&gt;Digital Certificates&lt;/strong&gt; , &lt;strong&gt;Certificate Authorities&lt;/strong&gt; , and the &lt;strong&gt;TLS Handshake&lt;/strong&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;2. The Digital Passport: What is a Certificate?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To solve the imposter problem, we need a way to tie a Public Key to a real-world identity. In the physical world, if someone claims to be “John Smith,” you don’t just take their word for it. You ask to see their Passport or Driver’s License.&lt;/p&gt;

&lt;p&gt;In the digital world, we use a &lt;strong&gt;Digital Certificate&lt;/strong&gt; (often called an SSL/TLS Certificate).&lt;/p&gt;

&lt;p&gt;A Digital Certificate is simply a tiny data file that binds a cryptographic Public Key to a specific organization or website. When you visit &lt;em&gt;bank.com&lt;/em&gt;, the server doesn't just hand you a bare Public Key; it hands you its Digital Certificate.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;What is inside a Digital Certificate?&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you click the little padlock icon next to the URL in your web browser, you can actually look at the website’s certificate. Inside, you will find:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Subject Identity:&lt;/strong&gt; The domain name (&lt;a href="http://www.bank.com" rel="noopener noreferrer"&gt;www.bank.com&lt;/a&gt;) and sometimes the company name holding it.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Public Key:&lt;/strong&gt; The actual mathematical key used to encrypt data sent to the bank.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Validity Dates:&lt;/strong&gt; An issue date and an expiration date (certificates expire to ensure security stays up-to-date).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Issuer:&lt;/strong&gt; The name of the organization that verified this information.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Digital Signature:&lt;/strong&gt; A cryptographic seal applied by the Issuer to prove the certificate hasn’t been forged.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk247wion6tp2tkqc6grr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk247wion6tp2tkqc6grr.png" width="800" height="409"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;A Digital Certificate binds a website’s identity to its Public Key, proving you are talking to the right server.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. The VIP List: Certificate Authorities (CAs)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You might have spotted a logical flaw in the certificate system. If a hacker can create a fake Public Key, what stops them from just typing up a fake Digital Certificate to go with it?&lt;/p&gt;

&lt;p&gt;If I print a piece of paper on my home printer that says “I am the President,” you wouldn’t believe it. But if the government prints me an official ID card with holograms and watermarks, you trust it.&lt;/p&gt;

&lt;p&gt;The internet relies on such “Governments” called &lt;strong&gt;Certificate Authorities (CAs)&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;CAs are highly secure, globally trusted organizations (like DigiCert, GlobalSign, or Let’s Encrypt). Their entire business is verifying identities. If &lt;em&gt;bank.com&lt;/em&gt; wants a certificate, they must apply to a CA. The CA investigates, verifies that the applicant actually owns the domain &lt;em&gt;bank.com&lt;/em&gt;, and &lt;em&gt;only then&lt;/em&gt; do they issue the Digital Certificate.&lt;/p&gt;

&lt;p&gt;Crucially, the CA signs the certificate using the &lt;strong&gt;CA’s own Private Key&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;The Root Store (The Browser’s VIP List):&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;How does your laptop know to trust DigiCert or Let’s Encrypt?&lt;/p&gt;

&lt;p&gt;When you buy a computer or download a web browser (like Chrome, Firefox, or Safari), it comes pre-installed with a highly guarded list called a &lt;strong&gt;Root Store&lt;/strong&gt;. This is a list of about 100 trusted Certificate Authorities and their Public Keys.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Chain of Trust works like this:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Your browser connects to &lt;em&gt;bank.com&lt;/em&gt; and receives a Certificate.&lt;/li&gt;
&lt;li&gt;Your browser checks the Certificate’s signature. It says, &lt;em&gt;“This was signed by DigiCert.”&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Your browser checks its internal Root Store. &lt;em&gt;“Is DigiCert on my pre-installed VIP list?”&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Yes, it is. The browser uses DigiCert’s Public Key from the VIP list to verify the signature on the bank’s certificate.&lt;/li&gt;
&lt;li&gt;Because the signature matches, your browser knows the Bank’s certificate is 100% authentic. The green padlock appears.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If a hacker presents a fake certificate, it won’t have a valid signature from a CA on your VIP list. Your browser will instantly throw up a massive, red warning screen: &lt;em&gt;“Your connection is not private.”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fivdgkg4ngl6a2wvwmxs8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fivdgkg4ngl6a2wvwmxs8.png" width="800" height="615"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Trust flows downward. Your browser trusts the CA, and the CA vouches for the website.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. The TLS Handshake: Bringing It All Together&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Now that we have solved the identity problem, how does the actual secure connection begin?&lt;/p&gt;

&lt;p&gt;This process is called the &lt;strong&gt;TLS Handshake&lt;/strong&gt; (Transport Layer Security). TLS is the modern, secure protocol that makes HTTPS possible. (You may also hear it referred to as SSL, which is an older, obsolete version of the same concept).&lt;/p&gt;

&lt;p&gt;When you type &lt;a href="https://bank.com" rel="noopener noreferrer"&gt;https://bank.com&lt;/a&gt; and press enter, your computer and the server perform a high-speed cryptographic conversation in milliseconds. It utilizes every single tool we have learned about earlier.&lt;/p&gt;

&lt;p&gt;Here is a simplified step-by-step of the TLS Handshake:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1: The Client Hello&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Your Browser:&lt;/strong&gt; &lt;em&gt;“Hi server! I want to connect securely. I know how to speak AES (Symmetric) and RSA (Asymmetric). Here is a random string of numbers to start.”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2: The Server Hello &amp;amp; Certificate&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Server:&lt;/strong&gt; &lt;em&gt;“Hi browser! Let’s use AES and RSA. Here is my Digital Certificate, which contains my Public Key.”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3: Verification &amp;amp; Key Exchange&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Your Browser:&lt;/strong&gt; &lt;em&gt;(Checks the certificate against its Root Store VIP list. The signature matches. The identity is verified.)&lt;/em&gt; &lt;em&gt;“Okay, you are definitely the real Bank. I am now going to generate a brand new, temporary Symmetric Key just for us to use today. I will lock this new key inside your Public Key and send it to you.”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4: The Switch to Symmetric&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Server:&lt;/strong&gt; &lt;em&gt;(Receives the locked message and uses its highly guarded Private Key to unlock it).&lt;/em&gt; &lt;em&gt;“I successfully decrypted your message. I now have the temporary Symmetric Key.”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 5: Secure Data Transfer&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Both sides:&lt;/strong&gt; Now that both the browser and the server share a fast, Symmetric key that no one else has, they abandon the slow Asymmetric math. They begin exchanging your passwords, account balances, and data at lightning speed, protected by Symmetric Encryption.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2di39dpv4pt79pjocvma.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2di39dpv4pt79pjocvma.png" width="800" height="391"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;The TLS Handshake uses Asymmetric crypto to verify identity and securely swap a Symmetric key for fast communication.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Why TLS is the Ultimate Target for Quantum Computers&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You have just learned the exact mechanism that secures trillions of dollars in global commerce, military communications, and private messaging every single day.&lt;/p&gt;

&lt;p&gt;But as we conclude our foundation in modern cryptography, we must look at the horizon. Why are governments and tech giants panicking about Quantum Computers?&lt;/p&gt;

&lt;p&gt;Look back at the TLS Handshake. It relies on &lt;strong&gt;Asymmetric Cryptography&lt;/strong&gt; (like RSA or Elliptic Curves) in two absolutely critical places:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;The Digital Signature:&lt;/strong&gt; The CA uses Asymmetric math to sign the certificate.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Key Exchange:&lt;/strong&gt; Your browser uses the server’s Asymmetric Public Key to safely transmit the Symmetric session key.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Quantum computers are uniquely designed to break Asymmetric math.&lt;/strong&gt; If a hacker gets a powerful quantum computer, they can mathematically reverse-engineer the Private Keys of the Certificate Authorities.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;They could forge perfect, mathematically valid certificates for bank.com or google.com.&lt;/li&gt;
&lt;li&gt;They could bypass the Root Store VIP list completely.&lt;/li&gt;
&lt;li&gt;Your browser would see a green padlock, completely unaware that the TLS handshake is happening with a hacker’s server.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The entire chain of trust would instantly evaporate. This is the “Quantum Apocalypse” scenario that Post-Quantum Cryptography (PQC) is racing to prevent.&lt;/p&gt;

&lt;h3&gt;
  
  
  Summary
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;HTTP&lt;/strong&gt; sends data in plain text. &lt;strong&gt;HTTPS&lt;/strong&gt; secures it using the TLS protocol.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Man-in-the-Middle (MITM) Attacks&lt;/strong&gt; happen when a hacker intercepts traffic and provides a fake Public Key.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Digital Certificates&lt;/strong&gt; solve this by acting as a digital passport, binding a Public Key to a real-world identity.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Certificate Authorities (CAs)&lt;/strong&gt; are trusted organizations that issue and digitally sign these certificates. Your browser trusts them via a pre-installed &lt;strong&gt;Root Store&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The TLS Handshake&lt;/strong&gt; is the process where a browser and server verify identities (using Certificates) and securely agree on a fast Symmetric key to encrypt the session.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;What’s Next?&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Now that we have completed the foundations of modern internet security. You know the &lt;em&gt;what&lt;/em&gt; and the &lt;em&gt;why&lt;/em&gt; of Cryptography.&lt;/p&gt;

&lt;p&gt;Next, we will be going to look under the hood at the &lt;em&gt;how&lt;/em&gt;. Before we can understand how Post-Quantum algorithms work, we must briefly understand the classical algorithms they are replacing.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In the upcoming article, we will demystify the most famous cryptographic algorithm in the world. We will look at the simple, elegant math that powers those Public and Private keys — and see exactly why it works so beautifully today.&lt;/p&gt;
&lt;/blockquote&gt;




</description>
      <category>tls</category>
      <category>cybersecurity</category>
      <category>internetsecurity</category>
      <category>cryptography</category>
    </item>
    <item>
      <title>Symmetric vs. Asymmetric Encryption Explained</title>
      <dc:creator>Shreehari Menon</dc:creator>
      <pubDate>Fri, 20 Feb 2026 05:18:09 +0000</pubDate>
      <link>https://dev.to/shreehari_menon/symmetric-vs-asymmetric-encryption-explained-4h35</link>
      <guid>https://dev.to/shreehari_menon/symmetric-vs-asymmetric-encryption-explained-4h35</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnj9a8jumtpz4xh3en9fl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnj9a8jumtpz4xh3en9fl.png" width="800" height="447"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;From Secret Handshakes to Public Keys: Why the Internet Needs Both - and Why Quantum Computers Threaten Them&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Introduction: The Impossible Handshake&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Imagine you want to send a secret package to a friend who lives on the other side of the world. You have a diamond (the data), a virtually indestructible steel box (the cipher), and a high-security padlock (the key).&lt;/p&gt;

&lt;p&gt;You put the diamond in the box, lock it with your padlock, and ship it. But then you realize a massive problem: How does your friend open it?&lt;/p&gt;

&lt;p&gt;You have the only key. If you mail the key in a separate envelope, the mail carrier (or a thief) could intercept the envelope, copy the key, and lock the envelope back up. They would then have full access to your diamond when the box arrives.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;This scenario represents the Key Distribution Problem, and it plagued cryptographers for thousands of years. For centuries, if generals wanted to communicate securely, they had to meet in person to exchange codebooks before going to war.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;In the digital age, “meeting in person” is impossible. Your web browser needs to communicate securely with a bank server in Switzerland that you have never visited. How can you agree on a secret code without a hacker in the middle stealing it?&lt;/p&gt;

&lt;p&gt;The answer lies in the two main families of cryptography: Symmetric and Asymmetric encryption.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Today, we will explore how they work, why they are different, and how the modern internet combines them to solve the “Impossible Handshake.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;2. Symmetric Encryption (The Secret Handshake)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;“Symmetric” means “the same on both sides.” In this type of cryptography, the same key is used to lock (encrypt) and unlock (decrypt) the data.&lt;/p&gt;

&lt;p&gt;This is the traditional form of cryptography, almost all historical encryption was symmetric.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;How It Works :&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Agreement: Alice and Bob agree on a secret key (e.g., “RedHorse99”).&lt;/li&gt;
&lt;li&gt;Encryption: Alice uses “RedHorse99” to scramble her message.&lt;/li&gt;
&lt;li&gt;Transmission: She sends the scrambled text to Bob.&lt;/li&gt;
&lt;li&gt;Decryption: Bob uses the exact same key, “RedHorse99,” to unscramble it.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;The Analogy: The Hotel Safe&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Think of a hotel room safe. You type in a 4-digit code (the key) to lock the door. To open the door again, you must type in that exact same 4-digit code. If you forget the code, the contents are lost. If someone watches you type the code, the security is broken.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;The Champion Algorithm: AES&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The gold standard for symmetric encryption today is AES (Advanced Encryption Standard). It is used by the US government to protect Top Secret data. AES is incredibly efficient and secure.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Speed: It is blazing fast. Modern computer processors often have special hardware just to run AES calculations instantly.&lt;/li&gt;
&lt;li&gt;Usage: It is used to encrypt data at rest (your hard drive) and high-volume data in transit (streaming video on Netflix).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;The Fatal Flaw&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Symmetric encryption has one major weakness: How do you share the key? If you are Amazon and you have millions of customers, you cannot possibly meet every customer in person to whisper a secret key into their ear. If you send the key over the internet, hackers can steal it.&lt;/p&gt;

&lt;p&gt;This limitation meant that for decades, secure communication over an open network like the internet was theoretically impossible, until 1976.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F738cvur5266m9tzsrpeu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F738cvur5266m9tzsrpeu.png" width="800" height="437"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Symmetric Encryption uses one shared key for both locking and unlocking. Speed is high, but sharing the key safely is hard.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Asymmetric Encryption (The Public Mailbox)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In 1976, researchers Whitfield Diffie and Martin Hellman proposed a radical idea that changed history. What if we didn’t use one key? What if we used two?&lt;/p&gt;

&lt;p&gt;This is called Asymmetric Encryption (or Public-Key Cryptography). In this system, every user generates a mathematically linked pair of keys:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;The Public Key: This key can be given to anyone. You can post it on Twitter, print it on a billboard, or put it in your email signature. It is used only to Encrypt (Lock).&lt;/li&gt;
&lt;li&gt;The Private Key: This key is kept secret. It never leaves your device. It is used only to Decrypt (Unlock).&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;The Magic Rule&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here is the mathematical magic that makes this work: Data encrypted with the Public Key can ONLY be decrypted by the Private Key. Even the Public Key itself cannot unscramble the message it just created!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;The Analogy: The Open Padlock&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Imagine Alice wants to receive secure messages.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Alice buys thousands of identical padlocks. She opens them all up.&lt;/li&gt;
&lt;li&gt;She sends these Open Padlocks (Public Keys) to everyone — Bob, Charlie, and the mailman. She keeps the Key (Private Key) to these padlocks in her pocket and never gives it to anyone.&lt;/li&gt;
&lt;li&gt;Bob wants to send Alice a secret. He puts his message in a box, grabs one of Alice’s open padlocks, and clicks it shut.&lt;/li&gt;
&lt;li&gt;Crucial Step: Once Bob snaps the padlock shut, &lt;em&gt;even Bob cannot open it again.&lt;/em&gt; He doesn’t have the key!&lt;/li&gt;
&lt;li&gt;The box travels safely to Alice. Even if a thief steals the box, they see a locked padlock.&lt;/li&gt;
&lt;li&gt;Alice receives the box and uses her Key (Private Key) to open it.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;The Champion Algorithms: RSA and ECC&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;RSA (Rivest-Shamir-Adleman): The original grandfather of internet security. It relies on the difficulty of factoring massive numbers.&lt;/li&gt;
&lt;li&gt;ECC (Elliptic Curve Cryptography): A modern, more efficient version. It provides the same security as RSA but with much smaller keys, making it perfect for mobile phones.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;The Flaw:&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If Asymmetric encryption is so magical, why don’t we use it for everything? It is incredibly slow. Because the math involved (factoring huge numbers) is complex, it requires a lot of processing power. If you tried to watch a YouTube video encrypted entirely with RSA, your battery would die in minutes, and the video would buffer constantly.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frb61590f8x00ot2z6i27.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frb61590f8x00ot2z6i27.png" width="800" height="362"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Asymmetric Encryption uses a Public Key to lock and a different Private Key to unlock. It solves the key distribution problem.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. The Hybrid Solution: The Best of Both Worlds&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;So, we have two tools:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Symmetric (AES): Fast, but hard to share keys.&lt;/li&gt;
&lt;li&gt;Asymmetric (RSA/ECC): Secure key sharing, but slow.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;How does the internet work? We use both.&lt;/p&gt;

&lt;p&gt;Every time you visit a secure website (https://), your browser performs a “Handshake” that combines these two families.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;The Hybrid Handshake (Simplified)&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;The Hello: Your browser contacts the Bank’s server.&lt;/li&gt;
&lt;li&gt;Asymmetric Phase: The Bank sends you its Public Key (The Open Padlock).&lt;/li&gt;
&lt;li&gt;Key Generation: Your browser generates a temporary Symmetric Key (e.g., “SessionKey123”).&lt;/li&gt;
&lt;li&gt;Secure Exchange: Your browser encrypts this “SessionKey123” using the Bank’s Public Key and sends it back.&lt;/li&gt;
&lt;li&gt;Decryption: The Bank uses its Private Key to decrypt the message and retrieve “SessionKey123.”&lt;/li&gt;
&lt;li&gt;Symmetric Phase: Now, both you and the Bank have “SessionKey123.” You discard the slow Asymmetric keys and use the fast Symmetric encryption (AES) for the rest of your browsing session.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This allows us to load high-definition video securely (speed of Symmetric) without ever having to meet the server administrator in person (security of Asymmetric).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn6mb9lpgakh4oys874p3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn6mb9lpgakh4oys874p3.png" width="800" height="390"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;The Internet uses Asymmetric crypto to safely swap a Symmetric key, then switches to Symmetric for speed.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Why This Distinctions Matters for the Future (PQC)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You might be wondering why we are spending so much time distinguishing between these two families.&lt;/p&gt;

&lt;p&gt;Here is the critical connection to the rest of this course:&lt;/p&gt;

&lt;p&gt;Quantum Computers affect these two families differently.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Symmetric Encryption (AES): It is mostly safe. Quantum computers can weaken it slightly, but we can fix that simply by making our keys longer (e.g upgrading from AES-128 to AES-256).&lt;/li&gt;
&lt;li&gt;Asymmetric Encryption (RSA/ECC): It is doomed. The math that powers Public/Private keys (factoring numbers) is exactly the kind of math that quantum computers are terrifyingly good at solving. A powerful quantum computer could derive your Private Key from your Public Key, shattering the security of the entire internet.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This is why Post-Quantum Cryptography (PQC) is almost entirely focused on finding replacements for the &lt;em&gt;Asymmetric&lt;/em&gt; part of the handshake. We need new ways to swap keys that don’t rely on the math that quantum computers can break.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Summary:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcc5ww6sbwbwfbypg79m4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcc5ww6sbwbwfbypg79m4.png" width="770" height="334"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What’s Next?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We have now covered the tools: Encryption, Hashing, and Signatures. We know how keys are swapped.&lt;/p&gt;

&lt;p&gt;But how do we trust the person giving us the key? If a hacker intercepts your connection to the bank and gives you &lt;em&gt;their&lt;/em&gt; Public Key instead of the bank’s, how would you know?&lt;/p&gt;

&lt;p&gt;The answer lies in the Certificate System.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In the upcoming week we will discuss How Internet Security Works (TLS, HTTPS &amp;amp; Certificates), we will put all these pieces together to explain the “Green Padlock” in your browser. We will learn how a global web of trust prevents hackers from impersonating Google, Amazon, or your bank.&lt;/p&gt;
&lt;/blockquote&gt;




</description>
      <category>cryptography</category>
      <category>encryption</category>
      <category>cybersecurity</category>
      <category>internetsecurity</category>
    </item>
    <item>
      <title>Encryption vs Hashing vs Digital Signatures: Understanding the Core of Digital Security</title>
      <dc:creator>Shreehari Menon</dc:creator>
      <pubDate>Fri, 13 Feb 2026 05:10:32 +0000</pubDate>
      <link>https://dev.to/shreehari_menon/encryption-vs-hashing-vs-digital-signatures-understanding-the-core-of-digital-security-1boa</link>
      <guid>https://dev.to/shreehari_menon/encryption-vs-hashing-vs-digital-signatures-understanding-the-core-of-digital-security-1boa</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw3dn73f3uc6so4td4ei5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw3dn73f3uc6so4td4ei5.png" width="800" height="334"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A beginner-friendly guide to the three technologies protecting modern digital communication.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Introduction: The Developer’s Dilemma&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A few years ago, a massive tech company suffered a devastating data breach. Cybercriminals broke into their backend servers and stole millions of user accounts. However, the real scandal was not the break-in itself; it was what the hackers found inside the database. The development team had “secured” the user passwords using &lt;em&gt;encryption&lt;/em&gt; instead of &lt;em&gt;hashing&lt;/em&gt;. When the hackers eventually found the decryption key hidden on another server, they instantly unlocked every single password in plain text.&lt;/p&gt;

&lt;p&gt;This is a classic - and highly dangerous - mistake.&lt;/p&gt;

&lt;p&gt;Earlier, we learned that cryptography is essentially a security toolbox designed to protect three things: &lt;strong&gt;Confidentiality&lt;/strong&gt; (keeping secrets), &lt;strong&gt;Integrity&lt;/strong&gt; (preventing tampering), and &lt;strong&gt;Authentication&lt;/strong&gt; (proving identity). But a toolbox is only useful if you know exactly which tool to grab. You wouldn’t use a hammer to drive a tiny screw. Similarly, you should never use encryption to store a password.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Today, we are going to pull the three most critical tools out of the cryptographic toolbox: &lt;strong&gt;Encryption&lt;/strong&gt; , &lt;strong&gt;Hashing&lt;/strong&gt; , and &lt;strong&gt;Digital Signatures&lt;/strong&gt;. By the end of this article, you will understand exactly how they differ, the intuition behind how they work mechanically, and precisely when you, as a developer, should use each one in a real-world system.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;2. Tool 1: Encryption (The Two-Way Street)&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Primary Goal:&lt;/strong&gt; Confidentiality (Keeping secrets safe from prying eyes)&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;When most people outside of the tech industry hear the word “cryptography”, they are actually thinking solely of encryption. Encryption is the process of scrambling readable data (Plaintext) into an unreadable format (Ciphertext), with the specific and deliberate intention of unscrambling it later.&lt;/p&gt;

&lt;p&gt;The most important thing to remember about encryption is that it is a &lt;strong&gt;two-way street&lt;/strong&gt;. If you can encrypt data, there is a mathematical way to decrypt it, provided you possess the right key.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works: The Lockbox Analogy&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Imagine you have a highly confidential corporate document. You place this document inside a sturdy titanium lockbox and snap a padlock shut. You hand the box to a courier. The courier can carry the box across the country, on airplanes and trains, but they cannot read the document inside. When the box finally reaches its destination, the recipient uses a physical key to unlock the padlock and read the original document.&lt;/p&gt;

&lt;p&gt;In digital terms:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The original document is the &lt;strong&gt;Plaintext&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;The locked titanium box is the &lt;strong&gt;Ciphertext&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;The physical key is the &lt;strong&gt;Cryptographic Key&lt;/strong&gt; (usually a long string of digital bits).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;When Developers Use Encryption&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You use encryption whenever data needs to travel securely or be stored safely, &lt;em&gt;and&lt;/em&gt; a legitimate user or system needs to read that original data later. Engineers generally divide this into two categories:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Data in Transit:&lt;/strong&gt; When information is moving across a network. For example, when you browse a website using HTTPS, the data flowing between your browser and the server is encrypted. Your Internet Service Provider can see that you are connected to a bank, but they cannot see your account balance or passwords.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Data at Rest:&lt;/strong&gt; When information is sitting still on a storage device. For example, BitLocker on Windows or FileVault on Mac encrypts your laptop’s entire hard drive. If a thief steals your laptop, they cannot extract your files without the decryption password.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjsr40vhylg41087ejlxn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjsr40vhylg41087ejlxn.png" width="800" height="265"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Encryption is a reversible process. What goes in can be perfectly recovered with the correct key.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Tool 2: Hashing (The One-Way Street)&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Primary Goal:&lt;/strong&gt; Integrity (Proving data hasn’t changed)&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;If encryption is a reversible lockbox, hashing is a paper shredder.&lt;/p&gt;

&lt;p&gt;Hashing is a mathematical algorithm that takes an input of &lt;em&gt;any size -&lt;/em&gt; a single word, a high-resolution photograph, or a 100-gigabyte database file - and crushes it down into a fixed-length string of random-looking characters. This output is called a &lt;strong&gt;Hash&lt;/strong&gt; or a  &lt;strong&gt;Digest&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Crucially, hashing is a &lt;strong&gt;one-way street&lt;/strong&gt;. Once data is hashed, it is mathematically impossible to reverse the process and get the original data back. Just as you cannot realistically reassemble a document once it has been thoroughly shredded, you cannot reverse a hash to recover the original data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Magic of the “Avalanche Effect”&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A high-quality hashing algorithm (like SHA-256) has two vital properties:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Deterministic:&lt;/strong&gt; If you hash the word “Apple”, you will get the exact same 64-character hash every single time.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Highly Sensitive (The Avalanche Effect):&lt;/strong&gt; If you hash a 500-page book, and then change a &lt;em&gt;single comma&lt;/em&gt; on page 240, the resulting hash of the entire book will completely and radically change. The new hash will look absolutely nothing like the old hash.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Why Developers Use Hashing&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Because hashes act as unique, highly sensitive digital fingerprints, they are perfect for two specific jobs:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;File Verification:&lt;/strong&gt; When you download a large software update, the developer publicly posts the “Hash” of the legitimate file on their website. Your computer downloads the file, hashes it locally, and compares the two hashes. If they match perfectly, you have mathematical proof that the file wasn’t corrupted during the download, nor was a virus secretly injected into it by a hacker.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Password Storage (The Golden Rule):&lt;/strong&gt; Websites must &lt;em&gt;never&lt;/em&gt; store your actual password. Instead, when you create an account, the server hashes your password and stores only the hash. When you log in tomorrow, the server hashes whatever you type into the login box and compares it to the stored hash. If they match, you are granted access.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvkkdkysyholflpmkf6zw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvkkdkysyholflpmkf6zw.png" width="800" height="385"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Hashing creates a unique, fixed-size fingerprint of data. It is inherently irreversible.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Tool 3: Digital Signatures (The Seal of Authenticity)&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Primary Goals:&lt;/strong&gt; Authentication (Proving Identity) and Non-Repudiation (You can’t deny sending it).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;In the physical world, we use pen-and-ink signatures and official notary stamps to prove that a contract is legitimate and that a specific person agreed to the terms. In the digital world, a scanned image of your signature is completely useless - it can be copy-pasted onto a fake document in seconds.&lt;/p&gt;

&lt;p&gt;We need a mathematically unbreakable proof of identity. We achieve this by cleverly combining &lt;strong&gt;Asymmetric Encryption&lt;/strong&gt; (which utilizes a Public and a Private key pair) and  &lt;strong&gt;Hashing&lt;/strong&gt;.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Note: We will dive deep into exactly how Public/Private keys work mathematically later on. For now, just know that the Private Key is kept absolutely secret by the sender, and the Public Key is shared freely with everyone in the world.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;How it Works: The Digital Wax Seal&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Imagine Alice wants to send a legally binding contract to Bob to buy a house. She needs to prove to Bob that she genuinely sent it, and she needs to guarantee that nobody altered the purchase price in transit.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;The Hash:&lt;/strong&gt; Alice’s computer first creates a Hash (a digital fingerprint) of the contract.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Signature:&lt;/strong&gt; Alice’s computer then encrypts &lt;em&gt;only that Hash&lt;/em&gt; using her secret &lt;strong&gt;Private Key&lt;/strong&gt;. This encrypted hash is her Digital Signature. She attaches this signature to the bottom of the contract and sends the whole package to Bob.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Verification:&lt;/strong&gt; Bob receives the contract. His computer performs two distinct actions:&lt;/li&gt;
&lt;/ol&gt;

&lt;ul&gt;
&lt;li&gt;It creates its own fresh Hash of the contract document.&lt;/li&gt;
&lt;li&gt;It decrypts Alice’s attached signature using Alice’s freely available &lt;strong&gt;Public Key&lt;/strong&gt;. Doing this reveals the original Hash that Alice made.&lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;The Match:&lt;/strong&gt; Bob’s computer compares the two hashes. If they match exactly, the signature is 100% valid!&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Because &lt;em&gt;only&lt;/em&gt; Alice possesses her Private Key, &lt;em&gt;only Alice&lt;/em&gt; could have created that specific signature. This provides &lt;strong&gt;Non-Repudiation -&lt;/strong&gt; Alice cannot claim later, “I didn’t sign that, I was hacked!” Furthermore, if a hacker intercepted the contract and changed the purchase price from $300,000 to $100,000, the hashes would no longer match, and the signature would instantly flash as invalid.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;When Developers Use Digital Signatures&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Software Updates:&lt;/strong&gt; Your iPhone will only install operating system updates that are digitally signed by Apple’s private key. This strictly prevents hackers from tricking your phone into installing fake, malicious software.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cryptocurrency &amp;amp; Web3:&lt;/strong&gt; In blockchain networks like Bitcoin, digital signatures are the core mechanism that proves &lt;em&gt;you&lt;/em&gt; are the true owner of a digital wallet and that you authorized a transfer of funds.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdqqyf2yn2be4fxm58rci.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdqqyf2yn2be4fxm58rci.png" width="800" height="375"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Digital Signatures use Hashing for integrity and Private Keys for identity, proving who sent a message and that it remains unaltered.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. The Grand Scenario: Putting it All Together&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To solidify these concepts, let’s look at a real-world scenario where a software developer must use all three tools simultaneously to build a secure system.&lt;/p&gt;

&lt;p&gt;Imagine Alice (a CEO) is sending a highly sensitive corporate acquisition document to Bob (her lead lawyer) over the internet.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Integrity:&lt;/strong&gt; First, Alice’s software runs the document through a &lt;strong&gt;Hashing&lt;/strong&gt; algorithm. This creates a fingerprint to ensure that not a single word of the acquisition terms can be altered during transit.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authentication:&lt;/strong&gt; Next, Alice’s software takes that Hash and locks it with her Private Key, creating a &lt;strong&gt;Digital Signature&lt;/strong&gt;. Bob now has undeniable proof that Alice - authorized this document.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Confidentiality:&lt;/strong&gt; Finally, Alice’s software takes the document and the signature, puts them together, and &lt;strong&gt;Encrypts&lt;/strong&gt; the entire package before sending it. Now, if corporate spies intercept the data as it travels across the internet, they will see nothing but scrambled noise.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;By combining the right tools for the right jobs, Alice and Bob have achieved absolute cryptographic security.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Summary: The Developer’s Cheat Sheet&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbi6zaq8kl2d8p66tu9pt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbi6zaq8kl2d8p66tu9pt.png" width="800" height="304"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What’s Next?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You now know the vital differences between scrambling data to hide it (Encryption) and crushing data to fingerprint it (Hashing). You also know that you should never, ever use encryption to store a password.&lt;/p&gt;

&lt;p&gt;However, a major question remains. Under the umbrella of “Encryption”, there is a massive historical divide. How exactly do those “Keys” work? How can two computers that have never physically met securely agree on a secret key over a public, crowded, and hostile network like the internet?&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In &lt;strong&gt;the upcoming articles&lt;/strong&gt; , we will crack open the mechanics of modern communication. We will discover the brilliant mathematics that make the modern internet possible - and learn exactly why upcoming quantum computers threaten to tear it all down.&lt;/p&gt;
&lt;/blockquote&gt;




</description>
      <category>digitalsignatures</category>
      <category>encryption</category>
      <category>hashing</category>
      <category>cryptography</category>
    </item>
    <item>
      <title>What is Cryptography and Why It Matters Today?</title>
      <dc:creator>Shreehari Menon</dc:creator>
      <pubDate>Fri, 06 Feb 2026 07:46:30 +0000</pubDate>
      <link>https://dev.to/shreehari_menon/what-is-cryptography-and-why-it-matters-today-3fao</link>
      <guid>https://dev.to/shreehari_menon/what-is-cryptography-and-why-it-matters-today-3fao</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcnwdd41fmw6ny6kpmnf0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcnwdd41fmw6ny6kpmnf0.png" width="800" height="373"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Understanding Cryptography from the Ground Up: A Beginner-Friendly Guide to the Security Techniques Protecting Modern Digital Systems Before We Dive into Post-Quantum Cryptography and Future Encryption Technologies&lt;/em&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Introduction: The Invisible Shield&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Imagine you are sitting in a busy airport terminal. You open your laptop, connect to the public Wi-Fi, and log into your company’s portal to check a confidential document. You don’t think twice about it.&lt;/p&gt;

&lt;p&gt;Technically, your data is being broadcast over radio waves to a router that hundreds of strangers are also using. Anyone with a cheap antenna and free software could intercept those radio waves. Yet, you trust that your password and your company’s secrets are safe.&lt;/p&gt;

&lt;p&gt;Why? Because of &lt;strong&gt;Cryptography&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Cryptography is the invisible infrastructure of the modern digital world. It is the science that allows us to build trust in an untrusted environment. Without it, the internet would be nothing more than a digital library -great for reading public information, but impossible for banking, shopping, or private conversation.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In this first article of our series &lt;em&gt;“&lt;/em&gt; &lt;strong&gt;The Road to Post-Quantum Cryptography&lt;/strong&gt; &lt;em&gt;”&lt;/em&gt;, we will steer clear of the complex mathematics. Instead, we will explore what cryptography actually is, the fundamental problems it solves, and why understanding it is critical for every developer and engineer today.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;2. What is Cryptography? (It’s Not Just Secrecy)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Many beginners believe cryptography is simply &lt;em&gt;“the art of writing codes to hide messages.”&lt;/em&gt; While that was true in the days of the Roman Empire, modern cryptography is much broader.&lt;/p&gt;

&lt;p&gt;In the digital age, cryptography is - &lt;strong&gt;&lt;em&gt;the science of mathematical techniques related to aspects of information security.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It doesn’t just hide data; it proves things about data. For an engineer, cryptography is a toolbox used to solve three specific problems, often called the &lt;strong&gt;CIA Triad&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs44kfx1bfigsth3sxzhs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs44kfx1bfigsth3sxzhs.png" alt="The three goals of modern cryptography." width="800" height="385"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Three Pillars&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Confidentiality (Secrecy)&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;The Goal:&lt;/strong&gt; Ensure that information is accessible &lt;em&gt;only&lt;/em&gt; to those authorized to have access.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Analogy:&lt;/strong&gt; A sealed envelope. If you send a letter in a sealed envelope, the mail carrier handles it, but they can’t read it. Only the person who opens the envelope can see the contents.&lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Integrity (Tamper-Proofing)&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;The Goal:&lt;/strong&gt; Ensure that data has not been changed or corrupted during transit.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Analogy:&lt;/strong&gt; A wax seal on that envelope. If the recipient receives the envelope and the wax seal is broken or smeared, they know someone tampered with the message, even if the letter inside looks fine.&lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Authentication (Identity)&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;The Goal:&lt;/strong&gt; Confirm the identity of the person or system you are communicating with.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The Analogy:&lt;/strong&gt; A signature or a passport. How do you know the letter actually came from your bank and not a scammer? Cryptography provides a mathematical way to prove origin.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;3. The Golden Rule: Kerckhoffs’s Principle&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Before we learn &lt;em&gt;how&lt;/em&gt; to encrypt things (which we will cover in the upcoming articles), we must understand the most important rule in cryptographic design.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;In the movies, hackers often try to figure out “the secret algorithm” used by the NSA or a bank. In reality, professional cryptographers &lt;strong&gt;do not hide the algorithm&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;In 1883, a Dutch cryptographer named Auguste Kerckhoffs formulated a principle that defines modern security:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;“A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.”&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fonp8txhb8za6qjr1f9cv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fonp8txhb8za6qjr1f9cv.png" alt="We trust the math (the box), not the secrecy. The security lies entirely in the Key." width="800" height="398"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why is this important?&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Open Source Trust:&lt;/strong&gt; The algorithms used to secure your bank account (like AES or RSA) are public. You can download the source code right now. They are secure not because the math is secret, but because the &lt;strong&gt;Key -&lt;/strong&gt; a specific string of random numbers used by you -is secret.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Peer Review:&lt;/strong&gt; Because the algorithms are public, thousands of mathematicians try to break them every day. If they survive this scrutiny, we trust them. A “secret” algorithm created by a company hasn’t been tested by anyone but them, making it dangerous.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Takeaway:&lt;/strong&gt; Never try to invent your own cryptography. Always use standard, public, peer-reviewed algorithms.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;4. Why It Matters Today (The Modern Stakes)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Cryptography used to be the domain of spies and generals. Today, it is a requirement for basic human functioning.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. The Data Economy&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We live in a world where data is currency. Credit card numbers, social security numbers, and health records are stored in databases accessible via the internet. Cryptography is the only barrier preventing this data from being copied and stolen &lt;em&gt;en-masse&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Privacy as a Human Right&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In an era of global surveillance and data tracking, encryption is one of the few tools individuals have to maintain privacy. Apps like WhatsApp and Signal use “End-to-End Encryption,” ensuring that not even the company running the app can read your messages.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. The Foundation of Blockchain&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You cannot understand Bitcoin, Ethereum, or Web3 without cryptography. These technologies use cryptographic concepts (which we will discuss later, like Hashing and Signatures) to create digital scarcity and prove ownership without a central bank.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. The Looming Challenge: The Quantum Horizon&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If cryptography is so great, why is there a “Post-Quantum” movement?&lt;/p&gt;

&lt;p&gt;The cryptographic systems we use today are built on specific mathematical problems that are hard for current computers to solve. However, scientists are currently building &lt;strong&gt;Quantum Computers&lt;/strong&gt; -machines that operate on the laws of quantum physics.&lt;/p&gt;

&lt;p&gt;Theoretical models suggest that a powerful quantum computer could solve these specific math problems incredibly quickly. If that happens, the “Shield” we discussed in the introduction would shatter. The privacy of the past, present, and future would be compromised.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6ux0r2meuppohhkj6z6c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6ux0r2meuppohhkj6z6c.png" alt="A new shield labeled “PQC” (Post-Quantum Cryptography) that blocks the Quantum Computer." width="800" height="384"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This is why you are learning this topic &lt;em&gt;now&lt;/em&gt;. We are in a transition period. The world is preparing to upgrade its cryptographic foundation, and there is a massive demand for engineers who understand both the old ways and the new “Post-Quantum” ways.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Summary&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Cryptography&lt;/strong&gt; is about more than just hiding secrets; it ensures &lt;strong&gt;Confidentiality&lt;/strong&gt; , &lt;strong&gt;Integrity&lt;/strong&gt; , and &lt;strong&gt;Authentication&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kerckhoffs’s Principle&lt;/strong&gt; teaches us that the system should be public, and only the &lt;strong&gt;Key&lt;/strong&gt; should be secret.&lt;/li&gt;
&lt;li&gt;We rely on these systems for everything from banking to private messaging.&lt;/li&gt;
&lt;li&gt;The field is currently evolving to face the &lt;strong&gt;Quantum Threat&lt;/strong&gt; , making this the perfect time to start learning.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;What’s Next?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Now that we understand the &lt;em&gt;goals&lt;/em&gt; of cryptography, we need to open the toolbox and see the specific tools we use to achieve them.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In the upcoming article, we will break down the three distinct tools of the trade: &lt;strong&gt;Encryption&lt;/strong&gt; , &lt;strong&gt;Hashing&lt;/strong&gt; , and &lt;strong&gt;Digital Signatures&lt;/strong&gt;. We will explain the mechanical difference between them and exactly when a developer should use one versus the other.&lt;/p&gt;
&lt;/blockquote&gt;




</description>
      <category>postquantumcryptography</category>
      <category>cybersecurity</category>
      <category>encryption</category>
      <category>quantumcomputing</category>
    </item>
    <item>
      <title>Insertion Sort</title>
      <dc:creator>Shreehari Menon</dc:creator>
      <pubDate>Mon, 02 Dec 2024 19:08:37 +0000</pubDate>
      <link>https://dev.to/shreehari_menon/insertion-sort-36i5</link>
      <guid>https://dev.to/shreehari_menon/insertion-sort-36i5</guid>
      <description>&lt;p&gt;&lt;em&gt;“Efficiency in Simplicity”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F0%2Azpl6blp7q55iyVIu" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F0%2Azpl6blp7q55iyVIu" width="1024" height="683"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Photo by Scott Graham on Unsplash&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;When one starts learning the basics of programming be it any language,&lt;br&gt;&lt;br&gt;
I 'am sure you would have encountered searching and sorting algorithms, as they form the foundation of computer science and programming.&lt;br&gt;&lt;br&gt;
Let’s keep searching algorithms for another article, here let’s dive into sorting algorithms and understand them, in particular, let’s discuss about insertion sort.&lt;br&gt;&lt;br&gt;
Sorting algorithms have been a cornerstone of computer science since its early days. In the 1940s, as computers were being developed, sorting became crucial for processing large amounts of data efficiently. Early methods like bubble sort and insertion sort were simple yet effective for small datasets.&lt;br&gt;&lt;br&gt;
Sorting algorithms are taught to beginners as they provide a fundamental understanding of how to organize and manage data efficiently. By learning sorting, one can grasp key programming concepts like loops, conditional statements &amp;amp; arrays, while also developing problem-solving skills.&lt;br&gt;&lt;br&gt;
Sorting algorithms help organize data, making it easier to find and use. For example, sorting a list of names alphabetically makes it much quicker to search for someone.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Why Sorting Algorithms Matter&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Sorting helps students realize the importance of optimizing solutions, as they compare simple algorithms like bubble sort with more advanced ones like quicksort, which perform better on large datasets.&lt;br&gt;&lt;br&gt;
Sorting algorithms are essential for real-world applications such as organizing files, searching data, and processing information in databases and search engines. These algorithms also lay the groundwork for more complex topics in computer science, making them an important starting point for further learning.&lt;/p&gt;

&lt;p&gt;There are numerous sorting algorithms available, but typically, students are taught only a few basic ones, while the others are overlooked.&lt;br&gt;&lt;br&gt;
Let me list out some popular ones: Bubble Sort, Selection Sort, Insertion Sort, Merge Sort, Quick Sort, Heap Sort.&lt;br&gt;&lt;br&gt;
I ‘am sure you would have heard of the first two,&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Bubble Sort&lt;/strong&gt; : Repeatedly compares and swaps adjacent elements until the list is sorted, with larger elements "bubbling" to the end.&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Selection Sort&lt;/strong&gt; : Select the smallest (or largest) element from the unsorted part of the list and swap it with the first unsorted element.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;What is Insertion Sort?&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Now let’s discuss about insertion sort in detail. Insertion sort is a simple yet efficient algorithm that’s actually very simple to understand.&lt;br&gt;&lt;br&gt;
Insertion sort is a straightforward sorting algorithm that produces the final sorted list one element at a time. It operates by selecting elements from the unsorted list and inserting them into the appropriate location in the sorted list. This is accomplished by comparing each element to the ones that came before it and rearranging them as necessary to make room for the new ones.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fknzgjrowx12qoigfs84k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fknzgjrowx12qoigfs84k.png" width="800" height="420"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;How Does Insertion Sort Work?&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faoobyy3xp1l1fyg8b086.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faoobyy3xp1l1fyg8b086.jpg" width="600" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Imagine a man holding a set of cards, typically we use our left hands to arrange and handle the cards, while our right hands are employed to arrange, choose, or insert a card. We all know that cards have a specific order starting with ace, king, queen, jack, 10, 9, ……2.&lt;br&gt;&lt;br&gt;
Assume that the left hand is holding the sorted section, and the right hand is picking up a card from the unsorted section and inserting it into the appropriate location among the sorted cards.&lt;br&gt;&lt;br&gt;
Now let’s understand this process step by step :&lt;br&gt;&lt;br&gt;
Initially, there is just one card in his left hand, it’s considered sorted.&lt;br&gt;&lt;br&gt;
Then we choose a card from the unsorted lot and place it in its appropriate position, i.e. place it on the right side of the first card if its value is less else to the left.&lt;br&gt;&lt;br&gt;
Similarly, now the next card is placed either in between the two cards on either ends depending on its value. This step is repeated until we have sorted the entire pack.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2vvohqtjsqv542x2jmh4.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2vvohqtjsqv542x2jmh4.gif" width="325" height="264"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Time and Space Complexities :&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Time Complexity&lt;/strong&gt; :
&lt;strong&gt;Best case&lt;/strong&gt; : O(n) — when the list is already sorted.
&lt;strong&gt;Average and Worst case&lt;/strong&gt; : O(n²) — when the list is unordered or nearly sorted.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Space Complexity&lt;/strong&gt; :
O(1) — Insertion sort is an in-place sorting algorithm, meaning it doesn’t require extra space for sorting, except for a small amount of space used for temporary variables.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Pros and Cons :&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Pros&lt;/strong&gt; :&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Simple to Implement&lt;/strong&gt; : Insertion sort is straightforward to understand and implement, making it a good algorithm for beginners.&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Efficient for Small Data Sets&lt;/strong&gt; : For small lists or nearly sorted data, insertion sort is very efficient since it can perform with O(n) time complexity in the best case.&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Stable&lt;/strong&gt; : It doesn’t change the relative order of equal elements, which can be important in certain applications.&lt;br&gt;&lt;br&gt;
&lt;strong&gt;In-Place Sorting&lt;/strong&gt; : It doesn’t require extra memory beyond the input list, making it memory efficient.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cons&lt;/strong&gt; :&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Inefficient for Large Data Sets&lt;/strong&gt; : The O(n²) time complexity in the average and worst case makes it impractical for large lists.&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Slower than More Advanced Algorithms&lt;/strong&gt; : When compared to algorithms like quicksort or merge sort, insertion sort is much slower for larger datasets, as it involves more comparisons and shifts.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;*&lt;em&gt;Implementation *&lt;/em&gt; :&lt;br&gt;
&lt;/p&gt;


&lt;/blockquote&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight java"&gt;&lt;code&gt;&lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="nn"&gt;java.util.*&lt;/span&gt;&lt;span class="o"&gt;;&lt;/span&gt;
&lt;span class="kd"&gt;public&lt;/span&gt; &lt;span class="kd"&gt;class&lt;/span&gt; &lt;span class="nc"&gt;InsertionSort&lt;/span&gt; &lt;span class="o"&gt;{&lt;/span&gt;
&lt;span class="kd"&gt;public&lt;/span&gt; &lt;span class="kd"&gt;static&lt;/span&gt; &lt;span class="kt"&gt;void&lt;/span&gt; &lt;span class="nf"&gt;insertionSort&lt;/span&gt;&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="kt"&gt;int&lt;/span&gt;&lt;span class="o"&gt;[]&lt;/span&gt; &lt;span class="n"&gt;arr&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;{&lt;/span&gt;
&lt;span class="kt"&gt;int&lt;/span&gt; &lt;span class="n"&gt;len&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;arr&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;length&lt;/span&gt;&lt;span class="o"&gt;;&lt;/span&gt;
&lt;span class="cm"&gt;/* start from 1 and not 0 as initially it's 
 * considered sorted with just 1 item */&lt;/span&gt;
&lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="kt"&gt;int&lt;/span&gt; &lt;span class="n"&gt;i&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="o"&gt;;&lt;/span&gt; &lt;span class="n"&gt;i&lt;/span&gt; &lt;span class="o"&gt;&amp;lt;&lt;/span&gt; &lt;span class="n"&gt;len&lt;/span&gt;&lt;span class="o"&gt;;&lt;/span&gt; &lt;span class="n"&gt;i&lt;/span&gt;&lt;span class="o"&gt;++)&lt;/span&gt; &lt;span class="o"&gt;{&lt;/span&gt;
&lt;span class="kt"&gt;int&lt;/span&gt; &lt;span class="n"&gt;key&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;arr&lt;/span&gt;&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="n"&gt;i&lt;/span&gt;&lt;span class="o"&gt;];&lt;/span&gt;
&lt;span class="c1"&gt;// pointer to index just before the key's index&lt;/span&gt;
&lt;span class="kt"&gt;int&lt;/span&gt; &lt;span class="n"&gt;j&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;i&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="o"&gt;;&lt;/span&gt;
&lt;span class="cm"&gt;/* move values in arr[0...i-1] greater
 * than key one position to their right */&lt;/span&gt;
&lt;span class="k"&gt;while&lt;/span&gt; &lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="n"&gt;j&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt; &lt;span class="o"&gt;&amp;amp;&amp;amp;&lt;/span&gt; &lt;span class="n"&gt;key&lt;/span&gt; &lt;span class="o"&gt;&amp;lt;&lt;/span&gt; &lt;span class="n"&gt;arr&lt;/span&gt;&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="n"&gt;j&lt;/span&gt;&lt;span class="o"&gt;])&lt;/span&gt; &lt;span class="o"&gt;{&lt;/span&gt;
&lt;span class="n"&gt;arr&lt;/span&gt;&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="n"&gt;j&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;arr&lt;/span&gt;&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="n"&gt;j&lt;/span&gt;&lt;span class="o"&gt;];&lt;/span&gt;
&lt;span class="n"&gt;j&lt;/span&gt;&lt;span class="o"&gt;--;&lt;/span&gt;      
&lt;span class="o"&gt;}&lt;/span&gt;
&lt;span class="cm"&gt;/* store the key just before the last shifted element
 * or after the element just smaller than or equal to the key */&lt;/span&gt;
&lt;span class="n"&gt;arr&lt;/span&gt;&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="n"&gt;j&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;key&lt;/span&gt;&lt;span class="o"&gt;;&lt;/span&gt;    
&lt;span class="o"&gt;}&lt;/span&gt;
&lt;span class="o"&gt;}&lt;/span&gt;
&lt;span class="kd"&gt;public&lt;/span&gt; &lt;span class="kd"&gt;static&lt;/span&gt; &lt;span class="kt"&gt;void&lt;/span&gt; &lt;span class="nf"&gt;main&lt;/span&gt;&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nc"&gt;String&lt;/span&gt;&lt;span class="o"&gt;[]&lt;/span&gt; &lt;span class="n"&gt;args&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;{&lt;/span&gt;
&lt;span class="kt"&gt;int&lt;/span&gt;&lt;span class="o"&gt;[]&lt;/span&gt; &lt;span class="n"&gt;arr&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="o"&gt;{&lt;/span&gt; &lt;span class="mi"&gt;15&lt;/span&gt;&lt;span class="o"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;11&lt;/span&gt;&lt;span class="o"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;7&lt;/span&gt;&lt;span class="o"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;10&lt;/span&gt;&lt;span class="o"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;9&lt;/span&gt; &lt;span class="o"&gt;};&lt;/span&gt;
&lt;span class="n"&gt;insertionSort&lt;/span&gt;&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="n"&gt;arr&lt;/span&gt;&lt;span class="o"&gt;);&lt;/span&gt;
&lt;span class="nc"&gt;System&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;out&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;println&lt;/span&gt;&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nc"&gt;Arrays&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;toString&lt;/span&gt;&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="n"&gt;arr&lt;/span&gt;&lt;span class="o"&gt;));&lt;/span&gt;
&lt;span class="o"&gt;}&lt;/span&gt;
&lt;span class="o"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Real Life examples&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Insertion sort, while simple, is extremely useful in some situations:&lt;br&gt;&lt;br&gt;
&lt;em&gt;Tiny lists&lt;/em&gt;: it’s good for sorting tiny lists because of its low overhead and simple implementation.&lt;br&gt;&lt;br&gt;
&lt;em&gt;Nearly Sorted Data&lt;/em&gt;: Insertion sort works best when data is nearly sorted since it requires fewer comparisons and shifts.&lt;br&gt;&lt;br&gt;
&lt;em&gt;Real-Time Sorting&lt;/em&gt;: In circumstances where data enters incrementally (for example, stock price changes), insertion sort can sort it live.&lt;br&gt;&lt;br&gt;
&lt;em&gt;Embedded systems&lt;/em&gt;: Insertion sort is a good choice for situations with limited memory or computing capacity, such as microcontrollers, because of its in-place nature and simplicity.&lt;br&gt;&lt;br&gt;
By understanding these use cases, it’s clear that insertion sort, though basic, has practical value in solving specific problems efficiently.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Insertion sort may not be the most efficient algorithm for large datasets, but its simplicity, stability, and effectiveness on small or nearly sorted data make it a fundamental part of understanding sorting algorithms. As one of the first sorting techniques taught to beginners, it provides a stepping stone to more advanced concepts in algorithm design and optimization.&lt;br&gt;&lt;br&gt;
By learning insertion sort, you not only gain insights into how sorting works but also develop problem-solving skills that are essential for tackling more complex challenges in computer science. Whether you’re sorting a deck of cards or analyzing large datasets, the principles behind insertion sort remind us of the importance of efficiency and precision in organizing data.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Levitin, A. (2012). &lt;em&gt;Introduction to the design &amp;amp; analysis of algorithms&lt;/em&gt; (pp. vii–x). Pearson Education, Inc.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;RichardsSoftware.net — CLRS Algorithm a Day: Insertion Sort&lt;/em&gt;. (n.d.). &lt;a href="http://richardssoftware.net/Home/Post/76" rel="noopener noreferrer"&gt;http://richardssoftware.net/Home/Post/76&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Juneja, J. (2022, October 19). Insertion Sort in Java with Examples and Use Cases — Scaler Topics. &lt;em&gt;Scaler Topics&lt;/em&gt;. &lt;a href="https://www.scaler.com/topics/insertion-sort-in-java/" rel="noopener noreferrer"&gt;https://www.scaler.com/topics/insertion-sort-in-java/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Card game Stock Photos, Royalty Free Card game Images | Depositphotos&lt;/em&gt;. (n.d.). Depositphotos. &lt;a href="https://depositphotos.com/photos/card-game.html?qview=358081532" rel="noopener noreferrer"&gt;https://depositphotos.com/photos/card-game.html?qview=358081532&lt;/a&gt;&lt;/p&gt;

</description>
      <category>insertionsort</category>
      <category>dsacourses</category>
      <category>algorithms</category>
      <category>java</category>
    </item>
  </channel>
</rss>
