0% found this document useful (0 votes)
45 views6 pages

COALProject Report

This document describes a student project to implement asymmetric encryption using the RSA algorithm in x86 assembly. The objective is to generate public and private key pairs to encrypt and decrypt ciphertext. It explains that asymmetric encryption uses a public key to encrypt messages and a private key to decrypt them. The methodology section outlines the steps to generate the keys using prime numbers and exponents with modulo arithmetic. The conclusion states that implementing RSA provided hands-on experience of asymmetric cryptography.

Uploaded by

Affan Ghazali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views6 pages

COALProject Report

This document describes a student project to implement asymmetric encryption using the RSA algorithm in x86 assembly. The objective is to generate public and private key pairs to encrypt and decrypt ciphertext. It explains that asymmetric encryption uses a public key to encrypt messages and a private key to decrypt them. The methodology section outlines the steps to generate the keys using prime numbers and exponents with modulo arithmetic. The conclusion states that implementing RSA provided hands-on experience of asymmetric cryptography.

Uploaded by

Affan Ghazali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

E​NCRYPTION  

1. TITLE OF THE PROJECT:

​“IMPLEMENTATION OF ASYMMETRIC ENCRYPTION IN x86 ASSEMBLY”

2. DESCRIPTION

What is Asymmetric Encryption?


● Asymmetric Encryption is a form of Encryption where key come in pairs. Users
create a matching key pair, making one public and the other one private. Either of
the keys can be used to encrypt a message. The opposite key from the one used
to encrypt the message is used for decryption.

Objective of our Project?


● We will implement RSA encryption Algorithm for Generating public and private
keys, these keys will be unique and cannot be driven from each other in x86
Assembly. The public key will be used to encrypt and the private key will be used
for decrypting the ciphertext to plain text. The Concept of Asymmetric encryption
is to share public key to sender and decrypt the message received from sender
using private key.
● Asymmetric encryption is the most used method over internet and HTTPS uses
this method of Encryption.


Working Methodology
Select two prime no's. Suppose P = 53 and Q = 59.

Now First part of the Public key : n = P*Q = 3127.

We also need a small exponent say e :

But e Must be

1. An integer.
2. Not be a factor of n.
3. 1 < e <​ ​Φ(n)​,
4. Let us now consider it to be equal to 3.

​Our Public Key is made of n and e

We need to calculate Φ(n) :

Such that Φ(n) = (P-1)(Q-1)

so, Φ(n) = 3016

Now calculate Private Key, d :

d = (k*Φ(n) + 1) / e for some integer k

For k = 2, value of d is 2011.

Decrypted Data = cd mod n.

Encrypted Data c = 89e mod n.





T​EAM

Name Roll Number Section

Affan Muhammad Ghazali 18K-0171 B

Muhammad Usama 18K-0154 B

Syed Anas Waseem 18K-0285 B

CONCLUSION

● The main and sole purpose of implementing the RSA algorithm was to experience
the asymmetric cryptography and encryption by hands on working on it. This
project enhanced our learning scale and we got to know other different techniques
which are used to cipher certain data. It was an amazing experience working on
this specific project.

You might also like