Blog | G5 Cyber Security

Algebra & cyber security: A Beginner’s Guide

TL;DR

Basic algebra is surprisingly important in cyber security. It helps with encryption, password cracking, and understanding how attacks work. This guide explains the core concepts and shows you where they’re used.

1. What is Algebra?

Algebra uses letters (like ‘x’ or ‘y’) to represent unknown numbers. We then use rules to find those numbers. The basics are:

For example, in x + 3 = 7, we want to find what number ‘x’ needs to be so that when you add 3 to it, you get 7. The answer is x=4.

2. Algebra in Encryption

Encryption scrambles data so only authorized people can read it. Algebra is at the heart of many encryption methods.

2.1 Caesar Cipher

A simple example is the Caesar cipher, where each letter is shifted a certain number of places down the alphabet. Let’s say we shift by 3:

Mathematically, this can be represented as:

ciphertext_letter = (plaintext_letter + key) % 26

(The `% 26` ensures we wrap around the alphabet.) To decrypt, you subtract the key.

2.2 More Complex Encryption (Modular Arithmetic)

Modern encryption uses much more complex algebra, often based on modular arithmetic. This involves doing calculations with a remainder after division.

For example: 17 mod 5 = 2 (because 17 divided by 5 is 3 with a remainder of 2).

RSA encryption uses this principle extensively, involving large prime numbers and exponents. While the full math is advanced, understanding modular arithmetic is key.

3. Algebra in Password Cracking

Password cracking often involves trying to find a password that matches a known hash (a one-way function output). Algebra can help with this.

3.1 Brute Force Attacks

Trying every possible password is brute force. Algebra isn’t directly used here, but understanding the size of the search space (number of possibilities) is important. This grows exponentially with password length.

3.2 Dictionary Attacks

Using a list of common passwords. Again, algebra doesn’t directly crack, but knowing how hashes work helps understand if a dictionary word might produce a matching hash.

3.3 Rainbow Tables

Pre-computed tables of hashes for common passwords. These use algebraic functions to reduce the storage space needed. They are less effective against salted hashes (see below).

3.4 Salting

Adding a random string (‘salt’) to each password before hashing makes rainbow tables ineffective. The salt changes the hash, even for the same password.

hash = hash_function(password + salt)

4. Understanding Attack Vectors

Many cyber security attacks rely on mathematical principles. Here are a few examples:

5. Practical Examples & Resources

  1. Simple Substitution Cipher Solver: Try solving basic ciphers online to practice algebraic thinking. Search for ‘Caesar cipher decoder’.
  2. Learn Modular Arithmetic: Khan Academy has excellent resources on modular arithmetic: https://www.khanacademy.org/math/arithmetic/arith-number-systems
  3. Cyber security Courses: Many introductory cyber security courses cover basic cryptography and the math behind it.
Exit mobile version