Preview

The Rsa Algorithm

Good Essays
Open Document
Open Document
5348 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Rsa Algorithm
The RSA Algorithm
Evgeny Milanov 3 June 2009
In 1978, Ron Rivest, Adi Shamir, and Leonard Adleman introduced a cryptographic algorithm, which was essentially to replace the less secure National Bureau of Standards (NBS) algorithm. Most importantly, RSA implements a public-key cryptosystem, as well as digital signatures. RSA is motivated by the published works of Diffie and Hellman from several years before, who described the idea of such an algorithm, but never truly developed it. Introduced at the time when the era of electronic email was expected to soon arise, RSA implemented two important ideas: 1. Public-key encryption. This idea omits the need for a “courier” to deliver keys to recipients over another secure channel before transmitting the originally-intended message. In RSA, encryption keys are public, while the decryption keys are not, so only the person with the correct decryption key can decipher an encrypted message. Everyone has their own encryption and decryption keys. The keys must be made in such a way that the decryption key may not be easily deduced from the public encryption key. 2. Digital signatures. The receiver may need to verify that a transmitted message actually originated from the sender (signature), and didn’t just come from there (authentication). This is done using the sender’s decryption key, and the signature can later be verified by anyone, using the corresponding public encryption key. Signatures therefore cannot be forged. Also, no signer can later deny having signed the message. This is not only useful for electronic mail, but for other electronic transactions and transmissions, such as fund transfers. The security of the RSA algorithm has so far been validated, since no known attempts to break it have yet been successful, mostly due to the difficulty of factoring large numbers n = pq, where p and q are large prime numbers.

1

Public-key cryptosystems.

Each user has their own encryption and decryption procedures, E and D, with the

You May Also Find These Documents Helpful

  • Good Essays

    Furthermore, entities A and B can now use end-to-end confidentiality and integrity services without the cooperation of any third entity. For example, users can exchange secure e-mail and securely access Web content on an intranet. Another advantage is that private keys are typically 1024-bit-long strings and cannot be guessed the way that passwords can. Therefore, you can use certificates for strong authentication.…

    • 575 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Digital Signature – a hash of a document that is encrypted using the document creator’s private key.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    4. They also could use digital signature plus they could use cryptography along with it…

    • 171 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Emails can be used to send information to individuals or a whole company, there are many different facilities within email software that can ensure the recipient has read the email this is important if the email contained time critical information. Also as email can be used as a legal form of communication it can be used to send contractual information and purchase orders.…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    These components work together to allow communication using public key cryptography and symmetric keys for digital signatures, data encryption, and integrity.…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Satisfactory Essays

    I do not agree with that statement. There are many ways to make email secure – whether using an end to end encrypted email, a virtual private network (VPN), secure erasure programs, and many other counter measures. If all countermeasures are taken, you would be able to trust an email to an individual just about as much as you can trust that individual. If someone wants information badly enough they will get that information regardless of what form of communication is being used.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bis/220 It Acts Paper

    • 590 Words
    • 3 Pages

    The internet and other information services have made almost any information obtainable at the click of a button. This has also made the world a much less secure place when it comes to protecting one’s work. It has also compromised the security of bank accounts and fund transfers of those who use the internet for purchases, banking, or use other automated machines. Due to these security issues two information technology acts were created to protect the people. First, the Electronic Fund Transfer Act (EFTA) was created in 1978. Then, the No Electronic Theft (NET) Act was created in 1997.…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Technology has gone from the days of the pony express to advancing at a rate of a mile a minute to now evolving to what seems like the speed of light or faster. With such a fast paced environment of change in technology, policies and laws must adapt to be compatible to those advancements in order to provide the best method to govern the laws and policies and protect its people. This paper will explore how technological advancements have influenced crucial changes in two essential policies: the Electronic Communications Privacy Act (ECPA) and the Electronic Funds Transfer Act (EFTA).…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    This occurs when a parent network provides filtering for traffic before it enters the child network to which individual and business customers connect.…

    • 16853 Words
    • 68 Pages
    Powerful Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    RSA is the first algorithm suited to both signing and encryption, and it is now widely used in e-commerce and other public key systems.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Study Guide for Business Law

    • 2585 Words
    • 11 Pages

    Many of the problems law addresses in the conventional commercial world must be revisited by the virtual world: digital signatures, privacy, copyright infringement, freedom of speech, fraud, and taxes…

    • 2585 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Signatures are no longer needed for many things. We do not need to sign for a lot of things now. Mostly everything is online now and all you have to do is press a botton. Their are some things you have to sign for but most people just scribble a line and their done.…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computers and smartphones are taking over. While signatures are still used quite often at various places, and for various reasons, a lot of signatures are simply electronic signatures. This can include a handheld device that uses a stylus to sign (even though it's extremely messy), or a check box on a website that you click to say that you are agreeing to the TOS or agreement. I love writing in cursive when I get the chance, but I also love the convenience and simplicity of not having to physically sign for a package, or agree to a contract.…

    • 457 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Bitcoin

    • 1098 Words
    • 5 Pages

    The Bitcoin was brought into existence in 2008 when a paper was released by someone with the pseudonym Satoshi Nakamoto. He explained the technicalities behind Bitcoin. The author’s actual name has not been identified to my knowledge. In the introduction of the paper, Nakamoto states that, “Commerce on the Internet has come to rely almost exclusively on financial institutions serving as trusted third parties to process electronic payments. While the system works well enough for most transactions, it still suffers from the inherent weaknesses of the trust based model.” The Bitcoin circumvents the need for third parties by maintaining a complete log of every Bitcoin creation and every transaction using Bitcoin by tracking the cryptographic hashes used to create it.…

    • 1098 Words
    • 5 Pages
    Better Essays