Select e such that GCD(phi (n) ,e)=1 ; 1<e<phi(n).
Determine d such that d*e ~ 1 (mod 160) and d<160.</li></li></ul><li>OUTPUT:-<br />
SECURITY OF RSA<br /> The security of the system depends on two critical assumptions:<br />1) Factoring is required to break the system, and <br />Factoring is `inherently computationally intractable', or, alternatively, `factoring is hard‘<br /> and `any approach that can be used to break <br /> the system is at least as hard as factoring'.<br />
RSA Currently in Use Today <br /><ul><li>RSA is currently used in a wide variety of products, platforms, and industries around the world.
It is found in many commercial software products. It is built into current operating systems by Microsoft, Apple and etc.
In hardware, RSA can be found in secure telephones, on Ethernet network cards, and on smart cards. In addition, RSA is incorporated into all of the major protocols for secured Internet communication.
It is also used internally in many institutions, major corporations, national laboratories, and universities.</li></li></ul><li> ADVANTAGES :<br /><ul><li>Provides security from unauthorized user/access.
This technique can be used in various fields 0f </li></ul> banking and National Security Service (NSS) .<br />TECHNICAL ADVANTAGES & BENEFITS :<br />ClassicSys is easy to implement in integrated circuits because:<br /><ul><li>it uses only XOR and branching functions.
Programming can be done with a polynomial structure.
The length of the blocks of key and data are identical and equal to 128 bits (16 bytes). </li></li></ul><li>CONCLUSION<br /><ul><li>It is most popular and most efficiently used algorithm due to its stability and reliability.
RSA is one of the standard algorithms that is used in most of the encryptions and decryption tasks.</li></ul>REFERENCES<br />Cryptography And Network Security - By William Stallings.Principles Of Key Management - By W .Fumy And P. Landrock.A Comparative Study Of RSA Encryption And Decryption – By R.E Ting And S.T. Barnum.<br />