Rsa Algorithm
Rsa Algorithm
HISTORY
RSA (Revest–Shamir–Adleman) is a public-key cryptosystem that is widely
used for secure data transmission. It is also one of the oldest.
The acronym RSA comes from the surnames of Ron Rivest, Adi Shamir,
and Leonard Adleman, who publicly described the algorithm in 1977. An
equivalent system was developed secretly, in 1973 at GCHQ (the
British signals intelligence agency), by the English mathematician Clifford
Cocks. That system was declassified in 1997.
BLOCK DIAGRAM
BLOCK DIAGRAM
Block diagram of RSA encryption algorithms IV. Design of the RSA Encryption
Algorithm The proposed design uses to translate the data from the original data
(plaintext) to ciphertext. The proposed design of the RSA Encryption Algorithm
consists of four stages. Each stage has its work. Fig 3 shows the block diagram of
the whole RSA algorithm system. The Fig 2 shows the four stages that suggested
for the propose architecture of the RSA algorithm.
RSA cryptographic algorithm used to encrypt and decrypt the messages to send
it over the secure transmission channel like internet. The RSA algorithm is a
secure, high quality, public key algorithm. In this paper, a new architecture and
modeling has been proposed for RSA public key algorithm, the suggested system
uses 1024-bit RSA encryption/decrypt...
RSA ALGORITHM
First, the receiver chooses two large prime numbers pp and qq. Their product, n=pqn=pq, will be half of the public key.
The receiver calculates \phi(pq)=(p-1)(q-1)ϕ(pq)=(p−1)(q−1) and chooses a number ee relatively prime to \phi(pq)ϕ(pq). In
practice, ee is often chosen to be 2^{16}+1=65537216+1=65537, though it can be as small as 33 in some cases. ee will be
the other half of the public key.
The receiver calculates the modular inverse dd of ee modulo \phi(n)ϕ(n). In other words, de \equiv 1
\pmod{{\small\phi(n)}}de≡1(modϕ(n)). dd is the private key.
The receiver distributes both parts of the public key: nn and ee. dd is kept secret.
Now that the public and private keys have been generated, they can be reused as often as wanted.
RSA ALGORITHM
1.The receiver
calculates c^d=183^{107} \equiv 72
\pmod{187}cd=183107≡72(mod187),
thus getting the message
of m=72m=72.
In this we assume that attacker knows some blocks of plain text and tries to decode cipher text with
the help of that. So, to prevent this pad the plain text before encrypting.
In this attacker will think that plain text is converted into cipher text using permutation and he will
apply right for conversion. But attacker does not right plain text. Hence will keep doing it.
SECURITY OF RSA
(iii) Unconcealed Message attack:
Sometimes happened that plain text is same as cipher text after encryption . So it must be checked it
cannot be attacked.
In this attacker is able to find out plain text based on cipher text using Extended Eculedian Algorithm.
3. Factorisation attack:
If attacker will able to know P and Q using N, then he could find out value of private key. This can be failed when
N contains atleast 300 longer digits in decimal terms, attacker will not able to find. Hence it fails.
TO KNOW MORE ABOUT RSA SECURITY
https://www.coursera.org/lecture/asymmetric-crypto/security-of-rsa-
94tuy?utm_source=link&utm_medium=page_share&utm_content=vlp&utm_campaign=top_button
THANK YOU
Created by: Omshree Prakash Chaudhary