Professional Documents
Culture Documents
Rsa Algorithm
Rsa Algorithm
Review
What
is RSA ?
message
encryption algorithm
encryption key
Transmission Channel
decryption key
decryption algorithm
message
unreadable by anyone is known as encryption. Decryption: It is the opposite of encryption. It may require secret decryption key. Authentication: Authentication in a digital setting is a process whereby the receiver of a digital message can be confident of the identity of the sender and/or the integrity of the message. Authentication protocols can be based on either conventional secret-key cryptosystems like DES or on public-key systems like RSA; authentication in public-key systems uses digital signatures. Digital Signature: It is an unforgeable piece of data asserting that a named person wrote or otherwise agreed to the document to which the signature is attached.
Public
Key algorithm invented in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman (RSA). Supports Encryption and Digital Signature. Most Widely used public Key Algorithm. Gets its security from integer factorization Problem. Relatively easy to understand and implement.
public encryption method that relies on a public encryption algorithm, a public decryption algorithm, and a public encryption key. Using the public key and encryption algorithm, everyone can encrypt a message. The decryption key is known only to authorized parties.
and q are two prime numbers. n = pq pi = (p-1)(q-1) Choose e is such that 1 < e < pi and gcd(pi,e) = 1. Compute d is such that d=e-1 mod(pi). The public key is (n, e) and the private key is (n, d).
Sender A does the following: Obtains the public key (n, e).
Represents the plaintext message as a positive
Recipient B does the following: Uses his private key (n, d) to compute
RSA gets its security from factorization problem. Difficulty of factoring large numbers is the basis of security of RSA. Over 1000 bits long numbers are used. Integer factorization problem (finding number's prime factors):
where, pi is positive distinct prime number. Example: 257603 = 41 * 61 * 103 o Factorization algorithms can be used to factor faster than brute forcing: Trial division, Pollard's rho, Pollard's p-1, Quadratic sieve, elliptic curve factorization, Random square factoring, Number field sieve, etc.