INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XIV, Issue XII, December 2025
A Secret History: The Invention and Re-Invention of Public-Key Cryptography
The story of RSA is not a single, linear narrative of invention but a remarkable tale of convergent evolution,
where the same revolutionary idea was born twice, independently, in two vastly different worlds: the clandestine
corridors of a government intelligence agency and the open, collaborative environment of a university.
The Precursors: Diffie, Hellman, and the Public-Key Revolution
For most of history, cryptography operated under a single paradigm: symmetric encryption. This method uses
the same secret key to both encrypt and decrypt a message. While effective, it suffers from a fundamental
logistical challenge known as the key distribution problem: for two parties to communicate securely, they must
first find a secure way to share the secret key. This often required a trusted courier or a face-to-face meeting, a
process that was slow, expensive, and impractical for the burgeoning digital age. [1]
In 1976, this ancient paradigm was shattered. In a groundbreaking paper titled "New Directions in
Cryptography," researchers Whitfield Diffie and Martin Hellman introduced the world to the theoretical concept
of public-key cryptography. They envisioned a system with two mathematically related keys: a public key,
which could be shared openly with the world, and a private key, which would be kept secret by its owner. A
message encrypted with the public key could only be decrypted by the corresponding private key. This
asymmetric approach elegantly solved the key distribution problem. They also conceptualised digital signatures,
but a practical implementation of a "trapdoor one-way function" to make it all work remained an open problem.
Their paper, however, lit a fire in the academic community and directly inspired the team at MIT that would
ultimately give the world RSA.
The Secret Cypher: Clifford Cocks and GCHQ's Classified Discovery
Unbeknownst to the public academic community, the puzzle posed by Diffie and Hellman had already been
solved inside the secretive world of British intelligence. In 1973, four years before RSA was publicly announced,
a young mathematician named Clifford Cocks at the UK's Government Communications Headquarters (GCHQ)
independently invented an identical algorithm.
Cocks had recently joined GCHQ after studying number theory at Cambridge and Oxford. He was presented
with a theoretical paper written in 1969 by his colleague James Ellis, which outlined the concept of "non-secret
encryption"—what the world would later call public-key cryptography. Ellis had conceived of the possibility but
had been unable to find a mathematical function to implement it. Cocks, with his background in number theory,
immediately saw a potential solution in prime factorisation and, within hours, developed the algorithm that
would later be known as RSA. Shortly after, another GCHQ mathematician, Malcolm Williamson,
independently developed a method for key exchange equivalent to what is now known as the Diffie-Hellman
protocol.
However, this monumental British achievement was immediately classified as top-secret. At the time, with the
high cost of computing power, the invention was seen more as a theoretical curiosity than a practical tool for
military use and was never deployed. The work remained hidden from the world for 24 years, finally being
declassified and revealed to the public in 1997.
The Public Breakthrough: Rivest, Shamir, and Adleman at MIT
Back in the public sphere, inspired by Diffie and Hellman's 1976 paper, three colleagues at the Massachusetts
Institute of Technology (MIT)—computer scientists Ron Rivest and Adi Shamir, and mathematician Leonard
Adleman—embarked on a quest to find the elusive trapdoor one-way function. Their process was a rigorous
cycle of creation and destruction: Rivest and Shamir would propose candidate functions, and Adleman's role
was to find their weaknesses and break them.
For nearly a year, they struggled, trying and discarding 42 different approaches until they began to believe the
task was impossible. The breakthrough came in April 1977. After a long day of work followed by a Passover
Page 945