Professional Documents
Culture Documents
Introduction:-
○ In a community on 'n' people, 'n' shared secret keys are needed for
Asymmetric Key Cryptography.
Note:-
1. RSA
3. Elgamal Cryptosystem
4. Diffie - Hellman
Before discuss about RSA algorithm we must know about Relative Prime
numbers.
GCD(6,13) = 1.
○ In this, Palin text and Cipher text are integers between 0 and N-1 for
some 'N'.
Solved Examples:-
1) Perform the encryption for the plain text 20 using RSA Algorithm
with the values p=5, q=11 and 13 as the public key.
2) Perform the encryption for the plain text 88 using RAS Algorithm
with the values p=17, q=11 and e=7.
3) In the RSA Public key Cryptosystem, the private and public keys
are (e, n) and (d, n) respectively, where n = p*q and p and q are
large primes. Let M be an integer such that 0<M<n and f(n) = (p-1)
(q-1). Now consider the following equations.
1) I and II
2) I and III
3) II and IV
4) III and IV
CRT states that the above equations have a unique solution of the moduli
are relatively prime.
Where
M = m1*m2*m3……..*mk.
we can find out M1-1, M2-1,…, Mk-1 by using trial and error method
without using Extended Euclidean algorithm.
3CSE-A CNS Page 7
without using Extended Euclidean algorithm.
M1 * M1-1 = 1 mod m1 i.e. we can find out the value of M1-1 in such a
way that, the remainder is equal to 1 when we calculate (M1 *
M1-1)/m1.
Solve the following example using CRT with set of equations with different moduli:
Applications:-
Rabin Cryptosystem :-
○ In Rabin Cryptosystem the value of 'e' and 'd' are fixed. i.e. e = 2 and d
= 1/2.
○ Public key in Rabin Cryptosystem is 'n' and Private key is tuple (p ,q).
i.e. Sender can encrypt the message using 'n' and Receiver can decrypt
the message using 'p' and 'q'.
Key Generation:-
Encryption:-
Decryption:-
Note :-
Example :-
Perform the encryption and decryption for the plain text 24 using Robin
Cryptosystem with the values p=23, q=7.
Primitive Root :-
Example :-
21 mod 5 2 mod 5 2
22 mod 5 4 mod 5 4
23 mod 5 8 mod 5 3
24 mod 5 16 mod 5 1
Elgamal Cryptosystem :-
Key Generation:-
Encryption:-
Decryption:-