The RSA Algorithm

Encryption

A message in its original form (plaintext) is encrypted into an unintelligent form (ciphertext) by a set of procedures known as an encryption algorithm and a variable, called a key; and the ciphertext is transformed (decrypted ) back into plaintext using the decryption algorithm and a key.

Public-key cryptography

Public-key (or two key) cryptography involves the use of two keys:

Public-key encryption process

The essential steps of public-key encryption process are following:

1. Each end system in a network generates a pair of keys to be used for encryption and decryption of messages that it will receive.
2. Each system publishes its encryption key by placing it in a public register or file. This is the public key. The companion key is kept private.
3. If A wishes to send a message to B, it encrypt the message using B's public key.
4. When B receives the message, B decrypt it using B's private key. No other recipients can decrypt the message because only B knows B's private key.

Application for public key cryptosystems


RSA

RSA algorithm

Encryption with RSA

RSA Example

p=3
q=11
n = pxq = 33
z = (p-1)(q-1) = 20
the relative primes to 20 are 1,3,7,9,11,13,17,19
e=3
d3=1 mod 20
d=7
C = Pe (mod n)
P = Cd (mod n)
If P = M(M=19) then C = 193 mod 33 = 28
P = 287 mod 33 = 19.

Security of RSA

The Factoring Problem

 


© 2002 www. thevsc.faithweb.com. All rights reserved.