Preview

Rivest-Shamir-Adlema Algorithm: An Analysis Of The RSA Algorithm

Powerful Essays
Open Document
Open Document
1013 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Rivest-Shamir-Adlema Algorithm: An Analysis Of The RSA Algorithm
Introduction RSA Algorithms
RSA stands for Rivest-Shamir-Adleman algorithm was invented on 1977 which is mostly used public-key cryptosystem. It was designed by Ron Rivest, Adi Shamir, and Leonard Adleman (Milanov 2009). This is the 1st crypto system which used two different keys to encrypt and decrypt the messages. In this cryptosystem it uses public key to encrypt and private key to decrypt the messages. Public key can be shared with everyone but the private key has to be with the person who want to decrypt the message secretly. If a messages encrypted using the public key, the message can only be decrypted using a private key show in the image below.
As shown in the image above Bob use a public key to encrypt the message which he wants
…show more content…
In this algorithm generating these two keys are the hardest part. To generate keys it uses few steps, and its explained below.
• The first step is to select two largest random prime numbers and assign to p and q. As example, p = 11 and q = 7.
• Then it is need to calculate RSA modular (n). To calculate RSA modular it as to multiply p from q. As example, n = p * q
• Second step is to calculate totient function (Q (n)). It mean totient of RSA calculated by p – 1 and q – 1. As example, Q (n) = (p – 1) (q –
…show more content…
As example, 1< X < Q (n).
• Final step is to calculate private decryption key (d). To calculate RSA use a formula, de = 1 mode Q (n). To solve this formula it use Euclidean algorithm. When the remainder equals to 1, RSA will start extended euclidean algorithm to solve deeper. When two original values shows up, that’s the end of the algorithm. If the last value is positive, it will assign that value to d or if it is a negative value, it has to be subtracted from totient function. As example, d = Q (n) – X.
All above mentioned steps are must to be followed when generating key in RSA.
Encryption
In RSA all the messages are encrypted using a public key. To do this public key encryption it use a formula, c = me mod n.
As an example which shown in figure 1, Bob wants to send a message saying “HIDE” to Alice. When encrypting the message, above mention formula will encrypt each and every character in the message. Example: p = 11, q = 5, n = 55, Q (n) = 40, e = 7, d = 23.
Message: HIDE
Formula: c = me mod n.
Encrypting

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Pt1420 Unit 6 Lab Report

    • 288 Words
    • 2 Pages

    Step 7 : Repeat this step using remainder REM of this step as input string,…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Pn = 3.2 n −1 Which is a multiple of 3 Qn = 6 n − 3 = 3(2n − 1) Which is also a multiple of 3 Since Tn = Q2 k −1 or Tn = P2 k for all n ∈ N , Tn is always divisible by 3…

    • 7470 Words
    • 30 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 7 Exercise 1

    • 641 Words
    • 3 Pages

    Computer security expert Bruce Schneier is the mastermind behind Blowfish and its successor Twofish. Keys used in this algorithm may be up to 256 bits in length and as a symmetric technique, only one key is needed.…

    • 641 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    8. symmetric-key: It only needs one key to encrypt the message. And both user only need the same key to decode the message. And the in order to create the key is by moving the bit. asymmetric-key: It needs two different keys- public key and private key. Everyone can see the public key and only the person who has private key can decode the message.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2) KeyGenSer(GP): Taking GP as an data or the input, this algorithm generates a private and public key combine (skS,pkS) for the data/information server.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Say the prime numbers in this series: 2, 3, 4, 5, 6. 2, 3, 5…

    • 2120 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Lab Report

    • 880 Words
    • 4 Pages

    For most of the questions I found the divisors or made generalizations based on other information I gained via other numbers divisors or I used logic to figure out simple rules to apply to the numbers.…

    • 880 Words
    • 4 Pages
    Good Essays
  • Better Essays

    (SEAN/ANDY, either find the RSA information, or remind me how do I find the public key information for RSA!!)…

    • 1267 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    |11 |Install JCrypt tool (or any other equivalent) and demonstrate Asymmetric, Symmetric crypto algorithm, Hash and |…

    • 632 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Project risk management helps on risk identification and assessment to see which ones can be mitigated or corrected, and how to monitor if there is a probability of occurrence. In the case of outsourcing resources, risk mitigation is needed in order to look and review efficiency and cost of the services and equipment that will be outsourced. However, to be able to use the risk assessment matrix it is essential to ensure that risk is accurately measured. The project will evaluate the suitability and potential of outsourcing human capital, Information…

    • 3443 Words
    • 14 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    RSA is the first algorithm suited to both signing and encryption, and it is now widely used in e-commerce and other public key systems.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The best type of key to use in this situation would be public-key cryptography, also known as asymmetric cryptography. It is a type of cryptographic algorithm that requires two separate keys. One of those keys is private, and kept secret. The other is public and distributed to those who need it. The keys are both needed since they are part of a mathematical algorithm, and one will not work without the other. This can be important in two ways. First it can be used to encrypt plain text information like files and emails. Second, it can be used to verify the identity of the person you are communicating with.…

    • 509 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Public Key Encryption: PKI Public Key Encryption technique to bind information through public key and provide data encryption and encryption. (What is PKI, comodo.com)…

    • 601 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Public Key Infrastructure

    • 2320 Words
    • 10 Pages

    Unknown Author. Public Key Encryption and Public key Infrastructure – Explained. Retrieved May 1, 2007 from: https://www.safe-mail.net/support/eng/help/protectsecure/pki.html…

    • 2320 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    The Data Encryption Standard (DES) algorithm has been a popular secret key encryption algorithm and is used in many commercial and financial applications.…

    • 2451 Words
    • 10 Pages
    Powerful Essays