Preview

The Rsa Algorithm

Good Essays
Open Document
Open Document
5348 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Rsa Algorithm
The RSA Algorithm
Evgeny Milanov 3 June 2009
In 1978, Ron Rivest, Adi Shamir, and Leonard Adleman introduced a cryptographic algorithm, which was essentially to replace the less secure National Bureau of Standards (NBS) algorithm. Most importantly, RSA implements a public-key cryptosystem, as well as digital signatures. RSA is motivated by the published works of Diffie and Hellman from several years before, who described the idea of such an algorithm, but never truly developed it. Introduced at the time when the era of electronic email was expected to soon arise, RSA implemented two important ideas: 1. Public-key encryption. This idea omits the need for a “courier” to deliver keys to recipients over another secure channel before transmitting the originally-intended message. In RSA, encryption keys are public, while the decryption keys are not, so only the person with the correct decryption key can decipher an encrypted message. Everyone has their own encryption and decryption keys. The keys must be made in such a way that the decryption key may not be easily deduced from the public encryption key. 2. Digital signatures. The receiver may need to verify that a transmitted message actually originated from the sender (signature), and didn’t just come from there (authentication). This is done using the sender’s decryption key, and the signature can later be verified by anyone, using the corresponding public encryption key. Signatures therefore cannot be forged. Also, no signer can later deny having signed the message. This is not only useful for electronic mail, but for other electronic transactions and transmissions, such as fund transfers. The security of the RSA algorithm has so far been validated, since no known attempts to break it have yet been successful, mostly due to the difficulty of factoring large numbers n = pq, where p and q are large prime numbers.

1

Public-key cryptosystems.

Each user has their own encryption and decryption procedures, E and D, with the

You May Also Find These Documents Helpful

  • Good Essays

    Furthermore, entities A and B can now use end-to-end confidentiality and integrity services without the cooperation of any third entity. For example, users can exchange secure e-mail and securely access Web content on an intranet. Another advantage is that private keys are typically 1024-bit-long strings and cannot be guessed the way that passwords can. Therefore, you can use certificates for strong authentication.…

    • 575 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Chapter 9 ISS

    • 620 Words
    • 3 Pages

    8 True or False: Cryptography is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    RSA is the first algorithm suited to both signing and encryption, and it is now widely used in e-commerce and other public key systems.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Digital Signature – a hash of a document that is encrypted using the document creator’s private key.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Electronic mail (or e-mail or email) is an Internet service that allows those people who have an e-mail address to send and receive electronic letters. Those are much like postal letters, except that they are delivered much faster than regular mail, when sending over long distances, and email is usually free. Email is appropriate for use by anyone in a working or business environment. It enables the sender to transmit lengthy information to others for free, in a much quicker time that it would to manually mail someone.…

    • 2215 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    It Info 1

    • 420 Words
    • 2 Pages

    OK, and how would you use public-private key cryptography to identify the sender of a message?…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The beginning of chapter 5 discusses the importance of cryptography and the legislative issues that surround government access. The debate of whether the government should have access to all encryptions we use, ultimately giving them total ability to read all communication to help fight crime and terrorism or if that is a breach of personal space. As the text attests to, "the tension between enabling secure conduct of electronic commerce and preventing secret communication among outlaws had been in the air for a decade" (Abelson, Ledeen, and Lewis 163). Later however, the government turned to helping citizens and businesses encrypt their messages to ultimately keep more information secure through packets from the construction of a system of routers (Abelson, Ledeen, and Lewis 164). However as technology has improved, the ability to create new encryption systems is…

    • 773 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Paper

    • 408 Words
    • 2 Pages

    OK, and how would you use public-private key cryptography to identify the sender of a message?…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Signatures are no longer needed for many things. We do not need to sign for a lot of things now. Mostly everything is online now and all you have to do is press a botton. Their are some things you have to sign for but most people just scribble a line and their done.…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    “Electronic mail, sometimes called email, is a computer based method of sending messages from one computer user to another. These messages usually consist of individual pieces of text which you can send to another computer user even if the other user is not logged in (i.e. using the computer) at the time you send your message.” (University of Birmingham, 2000). When a business sends an e-mail to another business either to conduct continual business or begin new business, the company receiving the e-mail can save the message as hard proof and keep an ongoing file for record purposes.…

    • 1145 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    This occurs when a parent network provides filtering for traffic before it enters the child network to which individual and business customers connect.…

    • 16853 Words
    • 68 Pages
    Powerful Essays
  • Powerful Essays

    Public Key Infrastructure

    • 2320 Words
    • 10 Pages

    With today’s security threat of hackers, spammers and viruses infecting computers, PKI is an essential component of an overall security strategy that must work in concert with other security mechanisms, business practices, and risk management efforts to help protect vital information (Weise, 2001). The Internet isn’t the only area of security that needs PKI, e-mail systems need to incorporate a higher level of security through digital signatures and e-mail encryption within the work environment to ensure business information is exchanged between validated and trusted recipients.…

    • 2320 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Is3230 Lab 1 PKI Analysis

    • 851 Words
    • 4 Pages

    The digital signature process results in a bit string that allows a recipient of a message to verify the identity of the signer of the message and the integrity of the message. Any one of several digital signature algorithms can generate the bit string. These algorithms have the generic characteristic that private information is used to make a signature and public information is used to verify signatures. A private key should be unique to its owner. If the owner of a private key uses it to encrypt a digital document, that encryption may be assumed to have the same meaning as a paper signature. It is a like a mark on the document that only the owner could have…

    • 851 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Bitcoin

    • 1098 Words
    • 5 Pages

    The Bitcoin was brought into existence in 2008 when a paper was released by someone with the pseudonym Satoshi Nakamoto. He explained the technicalities behind Bitcoin. The author’s actual name has not been identified to my knowledge. In the introduction of the paper, Nakamoto states that, “Commerce on the Internet has come to rely almost exclusively on financial institutions serving as trusted third parties to process electronic payments. While the system works well enough for most transactions, it still suffers from the inherent weaknesses of the trust based model.” The Bitcoin circumvents the need for third parties by maintaining a complete log of every Bitcoin creation and every transaction using Bitcoin by tracking the cryptographic hashes used to create it.…

    • 1098 Words
    • 5 Pages
    Better Essays

Related Topics