SlideShare a Scribd company logo
RSA Algorithm in Modular
Arithmetic
Discover the RSA algorithm, a
revolutionary method for secure
communication that relies on modular
arithmetic and prime numbers.
by Siddhanth Alape
Introduction to Cryptography and the RSA
Algorithm
Cryptography's Role
Cryptography ensures secure
communication by transforming
data into an unreadable format,
protecting sensitive information
from unauthorized access. RSA is a
widely used public-key
cryptosystem.
The RSA Algorithm
RSA is a powerful asymmetric
encryption algorithm. It relies on a
pair of keys - a public key for
encryption and a private key for
decryption.
Key Concepts: Prime Numbers,
Modular Arithmetic, Euler's
Totient Function
Prime Numbers
A prime number has only
two divisors: 1 and itself.
Prime numbers are crucial
for RSA's security.
Modular Arithmetic
Modular arithmetic deals
with remainders after
division. It forms the basis
of RSA's mathematical
operations.
Euler's Totient Function
Euler's Totient function counts the number of positive
integers less than a given integer that are relatively prime
to it. This function is key for generating RSA keys.
Generating Public and Private Keys
1 Choose two distinct large prime numbers, p and q.
2 Calculate the modulus n: n = p * q
3 Compute Euler's Totient function: φ(n) = (p - 1) * (q - 1)
4 Choose a public key exponent, e, that is relatively prime to φ(n) and 1 < e < φ
5 Calculate the private key exponent, d, such that: (e * d) mod φ(n) = 1
6 Public Key: (e, n)
7 Private Key: (d, n)
Encryption: Encoding a
Message using the Public
Key
Message
Transformation
Convert the message
into numerical
representation, typically
using ASCII encoding.
Public Key Application
Encrypt each numerical
block (m) of the message
using the public key: C =
m^e mod n
Ciphertext
The encrypted message
(C) is called the
ciphertext.
Decryption: Recovering
the Original Message
using the Private Key
Ciphertext Input
The ciphertext (C) is received by the intended
recipient.
Private Key Application
Decrypt each block of the ciphertext using
the private key: m = C^d mod n
Message Recovery
The original message (m) is recovered, revealing the
plaintext.
Example Calculations
and Walkthroughs
1
Key Generation
p = 17, q = 23, n = 391,
φ(n) = 336, e = 5, d = 281
2
Encryption
m = 88, C = 88^5 mod 391 = 269
3
Decryption
C = 269, m = 269^281 mod 391 = 88
Summary and
Applications of the RSA
Algorithm
RSA is a cornerstone of modern
cryptography, securing online
transactions, digital signatures, and data
privacy. Its strength lies in the
mathematical foundation of modular
arithmetic and prime factorization. RSA's
widespread use underscores its impact
on our digital world.

More Related Content

Similar to RSA-Algorithm-in-Modular-Arithmetic11 (1) (1).pptx (20)

PPTX
module 4 ppt on crypography and network security
PoornimaGn3
 
PPTX
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
werip98386
 
PPTX
Encryption and Decription of a Text Using Rivest-Shamir-Adleman Algorithm
slcfw4571
 
PPTX
Rsa algorithm
MDKAWSARAHMEDSAGAR
 
PPTX
RSA Algm.pptx
Sou Jana
 
PPTX
Cryptography using rsa cryptosystem
Samdish Arora
 
PDF
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
IJNSA Journal
 
PDF
Analysis of rsa algorithm using gpu
IJNSA Journal
 
PDF
Security of RSA and Integer Factorization
Dharmalingam Ganesan
 
PPT
Public Key Cryptography and RSA algorithm
Indra97065
 
PDF
Pooguzhali
NIVEDHINIMANIVANNAN
 
PPT
RSA Algorithm - Public Key Cryptography
Md. Shafiul Alam Sagor
 
PDF
PKC&RSA
Anver S R
 
PDF
Presentation about RSA
Srilal Buddika
 
PPT
PUBLIC KEY & RSA.ppt
RizwanBasha12
 
PPT
Rsa rivest shamir adleman
Hossain Md Shakhawat
 
PPTX
RSA Encryption presentation for Education.pptx
alihassan99765123
 
PDF
Public-Key Cryptography.pdfWrite the result of the following operation with t...
FahmiOlayah
 
module 4 ppt on crypography and network security
PoornimaGn3
 
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
werip98386
 
Encryption and Decription of a Text Using Rivest-Shamir-Adleman Algorithm
slcfw4571
 
Rsa algorithm
MDKAWSARAHMEDSAGAR
 
RSA Algm.pptx
Sou Jana
 
Cryptography using rsa cryptosystem
Samdish Arora
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
IJNSA Journal
 
Analysis of rsa algorithm using gpu
IJNSA Journal
 
Security of RSA and Integer Factorization
Dharmalingam Ganesan
 
Public Key Cryptography and RSA algorithm
Indra97065
 
RSA Algorithm - Public Key Cryptography
Md. Shafiul Alam Sagor
 
PKC&RSA
Anver S R
 
Presentation about RSA
Srilal Buddika
 
PUBLIC KEY & RSA.ppt
RizwanBasha12
 
Rsa rivest shamir adleman
Hossain Md Shakhawat
 
RSA Encryption presentation for Education.pptx
alihassan99765123
 
Public-Key Cryptography.pdfWrite the result of the following operation with t...
FahmiOlayah
 

Recently uploaded (20)

PPTX
Comparative Study of ML Techniques for RealTime Credit Card Fraud Detection S...
Debolina Ghosh
 
PDF
Business Automation Solution with Excel 1.1.pdf
Vivek Kedia
 
PDF
Business implication of Artificial Intelligence.pdf
VishalChugh12
 
PPTX
How to Add Columns and Rows in an R Data Frame
subhashenia
 
PDF
Exploiting the Low Volatility Anomaly: A Low Beta Model Portfolio for Risk-Ad...
Bradley Norbom, CFA
 
PDF
Loading Data into Snowflake (Bulk & Stream)
Accentfuture
 
PPTX
Module-2_3-1eentzyssssssssssssssssssssss.pptx
ShahidHussain66691
 
PPTX
04_Tamás Marton_Intuitech .pptx_AI_Barometer_2025
FinTech Belgium
 
PDF
Data Science Course Certificate by Sigma Software University
Stepan Kalika
 
PPTX
MENU-DRIVEN PROGRAM ON ARUNACHAL PRADESH.pptx
manvi200807
 
PPTX
Feb 2021 Ransomware Recovery presentation.pptx
enginsayin1
 
PPTX
Generative AI Boost Data Governance and Quality- Tejasvi Addagada
Tejasvi Addagada
 
PDF
A Web Repository System for Data Mining in Drug Discovery
IJDKP
 
PPTX
microservices-with-container-apps-dapr.pptx
vjay22
 
PDF
UNISE-Operation-Procedure-InDHIS2trainng
ahmedabduselam23
 
PDF
Unlocking Insights: Introducing i-Metrics Asia-Pacific Corporation and Strate...
Janette Toral
 
PDF
TESDA License NC II PC Operations TESDA, Office Productivity
MELJUN CORTES
 
PDF
Group 5_RMB Final Project on circular economy
pgban24anmola
 
PPTX
Data anlytics Hospitals Research India.pptx
SayantanChakravorty2
 
PPTX
美国史蒂文斯理工学院毕业证书{SIT学费发票SIT录取通知书}哪里购买
Taqyea
 
Comparative Study of ML Techniques for RealTime Credit Card Fraud Detection S...
Debolina Ghosh
 
Business Automation Solution with Excel 1.1.pdf
Vivek Kedia
 
Business implication of Artificial Intelligence.pdf
VishalChugh12
 
How to Add Columns and Rows in an R Data Frame
subhashenia
 
Exploiting the Low Volatility Anomaly: A Low Beta Model Portfolio for Risk-Ad...
Bradley Norbom, CFA
 
Loading Data into Snowflake (Bulk & Stream)
Accentfuture
 
Module-2_3-1eentzyssssssssssssssssssssss.pptx
ShahidHussain66691
 
04_Tamás Marton_Intuitech .pptx_AI_Barometer_2025
FinTech Belgium
 
Data Science Course Certificate by Sigma Software University
Stepan Kalika
 
MENU-DRIVEN PROGRAM ON ARUNACHAL PRADESH.pptx
manvi200807
 
Feb 2021 Ransomware Recovery presentation.pptx
enginsayin1
 
Generative AI Boost Data Governance and Quality- Tejasvi Addagada
Tejasvi Addagada
 
A Web Repository System for Data Mining in Drug Discovery
IJDKP
 
microservices-with-container-apps-dapr.pptx
vjay22
 
UNISE-Operation-Procedure-InDHIS2trainng
ahmedabduselam23
 
Unlocking Insights: Introducing i-Metrics Asia-Pacific Corporation and Strate...
Janette Toral
 
TESDA License NC II PC Operations TESDA, Office Productivity
MELJUN CORTES
 
Group 5_RMB Final Project on circular economy
pgban24anmola
 
Data anlytics Hospitals Research India.pptx
SayantanChakravorty2
 
美国史蒂文斯理工学院毕业证书{SIT学费发票SIT录取通知书}哪里购买
Taqyea
 
Ad

RSA-Algorithm-in-Modular-Arithmetic11 (1) (1).pptx

  • 1. RSA Algorithm in Modular Arithmetic Discover the RSA algorithm, a revolutionary method for secure communication that relies on modular arithmetic and prime numbers. by Siddhanth Alape
  • 2. Introduction to Cryptography and the RSA Algorithm Cryptography's Role Cryptography ensures secure communication by transforming data into an unreadable format, protecting sensitive information from unauthorized access. RSA is a widely used public-key cryptosystem. The RSA Algorithm RSA is a powerful asymmetric encryption algorithm. It relies on a pair of keys - a public key for encryption and a private key for decryption.
  • 3. Key Concepts: Prime Numbers, Modular Arithmetic, Euler's Totient Function Prime Numbers A prime number has only two divisors: 1 and itself. Prime numbers are crucial for RSA's security. Modular Arithmetic Modular arithmetic deals with remainders after division. It forms the basis of RSA's mathematical operations. Euler's Totient Function Euler's Totient function counts the number of positive integers less than a given integer that are relatively prime to it. This function is key for generating RSA keys.
  • 4. Generating Public and Private Keys 1 Choose two distinct large prime numbers, p and q. 2 Calculate the modulus n: n = p * q 3 Compute Euler's Totient function: φ(n) = (p - 1) * (q - 1) 4 Choose a public key exponent, e, that is relatively prime to φ(n) and 1 < e < φ 5 Calculate the private key exponent, d, such that: (e * d) mod φ(n) = 1 6 Public Key: (e, n) 7 Private Key: (d, n)
  • 5. Encryption: Encoding a Message using the Public Key Message Transformation Convert the message into numerical representation, typically using ASCII encoding. Public Key Application Encrypt each numerical block (m) of the message using the public key: C = m^e mod n Ciphertext The encrypted message (C) is called the ciphertext.
  • 6. Decryption: Recovering the Original Message using the Private Key Ciphertext Input The ciphertext (C) is received by the intended recipient. Private Key Application Decrypt each block of the ciphertext using the private key: m = C^d mod n Message Recovery The original message (m) is recovered, revealing the plaintext.
  • 7. Example Calculations and Walkthroughs 1 Key Generation p = 17, q = 23, n = 391, φ(n) = 336, e = 5, d = 281 2 Encryption m = 88, C = 88^5 mod 391 = 269 3 Decryption C = 269, m = 269^281 mod 391 = 88
  • 8. Summary and Applications of the RSA Algorithm RSA is a cornerstone of modern cryptography, securing online transactions, digital signatures, and data privacy. Its strength lies in the mathematical foundation of modular arithmetic and prime factorization. RSA's widespread use underscores its impact on our digital world.