
This paper starts from two fundamental principles—Information Conservation(A1) and Finite-Step Computability (A2)—to systematically derive the core concepts and protocol systems of modern cryptography. Research shows that fundamental cryptographic building blocks such as encryption, hashing, digital signatures, and security protocols are not ad hoc tools designed to counter specificthreats but are mathematical structures that inevitably arise from the universalneed to ensure controlled and verifiable transmission of information in untrustedenvironments, subject to the fundamental principles of information processing. Weprove that the boundary between computational feasibility (A2) and computational infeasibility naturally defines the foundation of cryptographic security; whilethe recoverability of information among authorized parties and its concealmentfrom unauthorized parties (as a specific form of A1) strictly constrain the mathematical properties that cryptographic transformations must satisfy. This paperfurther proposes experimental validation of the emerged cryptographic frameworkthrough side-channel attack experiments, solving competitions for computationallyhard problems, and formal verification of security protocols, thereby establishing afalsifiable bridge between the formal theory of cryptography and the physical realityof computation.
Cryptography; Information conservation; Computability; Computational security; One-way function; Public-key cryptography; Experimental test
Cryptography; Information conservation; Computability; Computational security; One-way function; Public-key cryptography; Experimental test
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
