Preview

Rivest-Shamir-Adlema Algorithm: An Analysis Of The RSA Algorithm

Powerful Essays
Open Document
Open Document
1013 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Rivest-Shamir-Adlema Algorithm: An Analysis Of The RSA Algorithm
Introduction RSA Algorithms
RSA stands for Rivest-Shamir-Adleman algorithm was invented on 1977 which is mostly used public-key cryptosystem. It was designed by Ron Rivest, Adi Shamir, and Leonard Adleman (Milanov 2009). This is the 1st crypto system which used two different keys to encrypt and decrypt the messages. In this cryptosystem it uses public key to encrypt and private key to decrypt the messages. Public key can be shared with everyone but the private key has to be with the person who want to decrypt the message secretly. If a messages encrypted using the public key, the message can only be decrypted using a private key show in the image below.
As shown in the image above Bob use a public key to encrypt the message which he wants
…show more content…
In this algorithm generating these two keys are the hardest part. To generate keys it uses few steps, and its explained below.
• The first step is to select two largest random prime numbers and assign to p and q. As example, p = 11 and q = 7.
• Then it is need to calculate RSA modular (n). To calculate RSA modular it as to multiply p from q. As example, n = p * q
• Second step is to calculate totient function (Q (n)). It mean totient of RSA calculated by p – 1 and q – 1. As example, Q (n) = (p – 1) (q –
…show more content…
As example, 1< X < Q (n).
• Final step is to calculate private decryption key (d). To calculate RSA use a formula, de = 1 mode Q (n). To solve this formula it use Euclidean algorithm. When the remainder equals to 1, RSA will start extended euclidean algorithm to solve deeper. When two original values shows up, that’s the end of the algorithm. If the last value is positive, it will assign that value to d or if it is a negative value, it has to be subtracted from totient function. As example, d = Q (n) – X.
All above mentioned steps are must to be followed when generating key in RSA.
Encryption
In RSA all the messages are encrypted using a public key. To do this public key encryption it use a formula, c = me mod n.
As an example which shown in figure 1, Bob wants to send a message saying “HIDE” to Alice. When encrypting the message, above mention formula will encrypt each and every character in the message. Example: p = 11, q = 5, n = 55, Q (n) = 40, e = 7, d = 23.
Message: HIDE
Formula: c = me mod n.
Encrypting

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Mat 221 Week 4 Dis. 1

    • 293 Words
    • 2 Pages

    The numbers are plugged into the formula P = A(1+r)-n and the quantity raised to a power and has a negative exponent of –n. It will look like:…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Pt1420 Unit 6 Lab Report

    • 288 Words
    • 2 Pages

    Step 7 : Repeat this step using remainder REM of this step as input string,…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 7 Exercise 1

    • 641 Words
    • 3 Pages

    RSA is a public-key encryption algorithm and the standard for encrypting data sent over the internet. It also happens to be one of the…

    • 641 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    8. symmetric-key: It only needs one key to encrypt the message. And both user only need the same key to decode the message. And the in order to create the key is by moving the bit. asymmetric-key: It needs two different keys- public key and private key. Everyone can see the public key and only the person who has private key can decode the message.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2) KeyGenSer(GP): Taking GP as an data or the input, this algorithm generates a private and public key combine (skS,pkS) for the data/information server.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    PHI103 WEEK1 QUIZ

    • 2741 Words
    • 11 Pages

    Since Jessica’s participation in local politics increased significantly after she joined her school’s political science club, it is clear that her involvement in that club led her to take an interest in politics.…

    • 2741 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    RSA is the first algorithm suited to both signing and encryption, and it is now widely used in e-commerce and other public key systems.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Better Essays

    (SEAN/ANDY, either find the RSA information, or remind me how do I find the public key information for RSA!!)…

    • 1267 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    |11 |Install JCrypt tool (or any other equivalent) and demonstrate Asymmetric, Symmetric crypto algorithm, Hash and |…

    • 632 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The best type of key to use in this situation would be public-key cryptography, also known as asymmetric cryptography. It is a type of cryptographic algorithm that requires two separate keys. One of those keys is private, and kept secret. The other is public and distributed to those who need it. The keys are both needed since they are part of a mathematical algorithm, and one will not work without the other. This can be important in two ways. First it can be used to encrypt plain text information like files and emails. Second, it can be used to verify the identity of the person you are communicating with.…

    • 509 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Project risk management helps on risk identification and assessment to see which ones can be mitigated or corrected, and how to monitor if there is a probability of occurrence. In the case of outsourcing resources, risk mitigation is needed in order to look and review efficiency and cost of the services and equipment that will be outsourced. However, to be able to use the risk assessment matrix it is essential to ensure that risk is accurately measured. The project will evaluate the suitability and potential of outsourcing human capital, Information…

    • 3443 Words
    • 14 Pages
    Good Essays
  • Powerful Essays

    Public Key Infrastructure

    • 2320 Words
    • 10 Pages

    Unknown Author. Public Key Encryption and Public key Infrastructure – Explained. Retrieved May 1, 2007 from: https://www.safe-mail.net/support/eng/help/protectsecure/pki.html…

    • 2320 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Public Key Encryption: PKI Public Key Encryption technique to bind information through public key and provide data encryption and encryption. (What is PKI, comodo.com)…

    • 601 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Health Care Spending

    • 753 Words
    • 4 Pages

    There are many issues with health care spending predicting the upcoming years. There are many questions individuals ask, such as will the premium and deductible be affordable? How will it affect the health care spending? And will it reduce health care cost? After reviewing the article Health Care Reform 2 it describes important issues with the Obamacare. The article states the Obamacare will not reduce health care spending because the Obamacare the achievement source will begin next year. However, it does not show the government how successful the Obamacare will be or either shows how it will benefit the economy. The author opinion of the Obamacare will not decrease health care spending he feels like it would increase the health care spending. His predicts in 11 years Americans will spend $1.8 trillion on the new government funding for the poor and middle-class individuals uninsured to obtain health insurance and to increase. In review from the author point-of-view the Obamacare law does not address or control the sudden increase of health care cost. The next question was stated was will the Obamacare reduce reimbursement for Medicare physicians? The Centers for Medicare and Medicaid department has predicted Americans will spend $36.8 trillion over the next 10 years in health care. “The author’s opinion without passing the Obamacare law, the country will spend less than $500 billion in the next ten10 years” (Howard, 2013, p. 1) If the Obamacare is passed will families and employers face raising cost? The article states from the time when the Obamacare passed it have increased health care by 11.3%, Depending on the family size working families will have to add in 27%, more on his or her part. By dropping out-of-pocket cost for consumers the Obamacare will decrease incentives of the health care cost for the consumers. Overview of the author point of view he…

    • 753 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The Data Encryption Standard (DES) algorithm has been a popular secret key encryption algorithm and is used in many commercial and financial applications.…

    • 2451 Words
    • 10 Pages
    Powerful Essays