SlideShare a Scribd company logo
1 of 72
Download to read offline
Introduction

Algorithm

Usage

Correctness

Security

RSA algorithm
Adrian Spataru
Department of Computer Science,
West University of Timi¸oara
s

October 30, 2013

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

1 Introduction
2 Algorithm
3 Usage
4 Correctness
5 Security

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

About

What is it?

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

About

What is it?
an algorithm for public key cryptography

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

About

What is it?
an algorithm for public key cryptography
based on the difficulty of factoring large integers.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

About

What is it?
an algorithm for public key cryptography
based on the difficulty of factoring large integers.
Where does the name come from?

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

About

What is it?
an algorithm for public key cryptography
based on the difficulty of factoring large integers.
Where does the name come from?
Ron
Rivest

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

About

What is it?
an algorithm for public key cryptography
based on the difficulty of factoring large integers.
Where does the name come from?
Ron
Rivest
Adi
Shamir

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

About

What is it?
an algorithm for public key cryptography
based on the difficulty of factoring large integers.
Where does the name come from?
Ron
Rivest
Adi
Shamir
Leonard Adleman

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Introduction

Where it’s being used?

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Introduction

Where it’s being used?
Communication

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Introduction

Where it’s being used?
Communication
Banks

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Introduction

Where it’s being used?
Communication
Banks
Signatures

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Introduction

Where it’s being used?
Communication
Banks
Signatures
Identity Certificates

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1

Adrian Spataru
RSA algorithm

Take p and q large prime numbers

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q
n is called the modulus and it is public

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q
n is called the modulus and it is public
Its length denotes the key length

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

3

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q
n is called the modulus and it is public
Its length denotes the key length
Compute ϕ(n) = (p − 1)(q − 1)

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

3

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q
n is called the modulus and it is public
Its length denotes the key length
Compute ϕ(n) = (p − 1)(q − 1)
ϕ is Euler’s totient function.

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

3

4

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q
n is called the modulus and it is public
Its length denotes the key length
Compute ϕ(n) = (p − 1)(q − 1)
ϕ is Euler’s totient function.
Choose e, s.t. 1 < e < ϕ(n) and gcd(e, ϕ(n)) = 1

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

3

4

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q
n is called the modulus and it is public
Its length denotes the key length
Compute ϕ(n) = (p − 1)(q − 1)
ϕ is Euler’s totient function.
Choose e, s.t. 1 < e < ϕ(n) and gcd(e, ϕ(n)) = 1
e is released as public exponent

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

3

4

5

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q
n is called the modulus and it is public
Its length denotes the key length
Compute ϕ(n) = (p − 1)(q − 1)
ϕ is Euler’s totient function.
Choose e, s.t. 1 < e < ϕ(n) and gcd(e, ϕ(n)) = 1
e is released as public exponent
Compute d as d −1 ≡ e(modϕ(n))

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

3

4

5

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q
n is called the modulus and it is public
Its length denotes the key length
Compute ϕ(n) = (p − 1)(q − 1)
ϕ is Euler’s totient function.
Choose e, s.t. 1 < e < ϕ(n) and gcd(e, ϕ(n)) = 1
e is released as public exponent
Compute d as d −1 ≡ e(modϕ(n)) or

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

3

4

5

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q
n is called the modulus and it is public
Its length denotes the key length
Compute ϕ(n) = (p − 1)(q − 1)
ϕ is Euler’s totient function.
Choose e, s.t. 1 < e < ϕ(n) and gcd(e, ϕ(n)) = 1
e is released as public exponent
Compute d as d −1 ≡ e(modϕ(n)) or
d × e ≡ 1(modϕ(n))

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Computing d

Let x = ϕ(n) + 1.
If x divides e → d = x/e
else x becomes x + ϕ(n)
repeat

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Example

Suppose p = 17 and q = 23.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Example

Suppose p = 17 and q = 23.
Then n (modulus) = 391

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Example

Suppose p = 17 and q = 23.
Then n (modulus) = 391
ϕ(n) = (16 × 22) = 352

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Example

Suppose p = 17 and q = 23.
Then n (modulus) = 391
ϕ(n) = (16 × 22) = 352
Let’s choose e = 3.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Example

Suppose p = 17 and q = 23.
Then n (modulus) = 391
ϕ(n) = (16 × 22) = 352
Let’s choose e = 3.
d = 1(modϕ(n)) = 235.
e

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Scenario

Traian wants to communicate with Angela via RSA encrypted
messages.
Both of them generate a RSA key-pair.
Traian gives to Angela his public key, and Angela gives to
Traian hers.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Encryption

Angela wants to send Traian the message M.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Encryption

Angela wants to send Traian the message M.
The message is turned into an integer m, 0 ≤ m < n.
based on a padding scheme
Angela computes c = me (modn) (e from Traian’s public key,
and sends this to Traian.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Decryption

Traian can recover the message with the formula
m = c d (modn).
Reverse the padding scheme to get the message.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Tricks

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Tricks
For encryption, exponentiation by squaring can save a lot
of time.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Tricks
For encryption, exponentiation by squaring can save a lot
of time.
For decryption, the Chinese remainder algorithm can be
used.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Tricks
For encryption, exponentiation by squaring can save a lot
of time.
For decryption, the Chinese remainder algorithm can be
used.
This algorithm stores in the private key several
precomputed values (dP , dQ , qinv ).
dP = d(modp − 1)

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Tricks
For encryption, exponentiation by squaring can save a lot
of time.
For decryption, the Chinese remainder algorithm can be
used.
This algorithm stores in the private key several
precomputed values (dP , dQ , qinv ).
dP = d(modp − 1)
dQ = d(modq − 1)

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Tricks
For encryption, exponentiation by squaring can save a lot
of time.
For decryption, the Chinese remainder algorithm can be
used.
This algorithm stores in the private key several
precomputed values (dP , dQ , qinv ).
dP = d(modp − 1)
dQ = d(modq − 1)
qinv = q −1 (modp)

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Tricks
For encryption, exponentiation by squaring can save a lot
of time.
For decryption, the Chinese remainder algorithm can be
used.
This algorithm stores in the private key several
precomputed values (dP , dQ , qinv ).
dP = d(modp − 1)
dQ = d(modq − 1)
qinv = q −1 (modp)
m1 = c dP (modp); m2 = c dQ (modq);

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Tricks
For encryption, exponentiation by squaring can save a lot
of time.
For decryption, the Chinese remainder algorithm can be
used.
This algorithm stores in the private key several
precomputed values (dP , dQ , qinv ).
dP = d(modp − 1)
dQ = d(modq − 1)
qinv = q −1 (modp)
m1 = c dP (modp); m2 = c dQ (modq);
h = qinv (m1 − m2)(modp)
Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Tricks
For encryption, exponentiation by squaring can save a lot
of time.
For decryption, the Chinese remainder algorithm can be
used.
This algorithm stores in the private key several
precomputed values (dP , dQ , qinv ).
dP = d(modp − 1)
dQ = d(modq − 1)
qinv = q −1 (modp)
m1 = c dP (modp); m2 = c dQ (modq);
h = qinv (m1 − m2)(modp)
m = m2 + hq
Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem

Theorem
Let p be a prime number
∀a - integer number, ap − a is multiple of p.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem

Theorem
Let p be a prime number
∀a - integer number, ap − a is multiple of p.
ap ≡ a(modp)

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem

Theorem
Let p be a prime number
∀a - integer number, ap − a is multiple of p.
ap ≡ a(modp)
If a is not divisible by p, then

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem

Theorem
Let p be a prime number
∀a - integer number, ap − a is multiple of p.
ap ≡ a(modp)
If a is not divisible by p, then
ap−1 ≡ 1(modp).

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem generalization
Theorem
If p is prime and m and n are positive integers s.t.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem generalization
Theorem
If p is prime and m and n are positive integers s.t.
m ≡ n(modϕ(p)),

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem generalization
Theorem
If p is prime and m and n are positive integers s.t.
m ≡ n(modϕ(p)), then ∀a, we have am ≡ an (modp).

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem generalization
Theorem
If p is prime and m and n are positive integers s.t.
m ≡ n(modϕ(p)), then ∀a, we have am ≡ an (modp).
m = b(p − 1) + n

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem generalization
Theorem
If p is prime and m and n are positive integers s.t.
m ≡ n(modϕ(p)), then ∀a, we have am ≡ an (modp).
m = b(p − 1) + n
am = ab(p−1) × an ≡ 1b × an ≡ an (modp)

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem generalization
Theorem
If p is prime and m and n are positive integers s.t.
m ≡ n(modϕ(p)), then ∀a, we have am ≡ an (modp).
m = b(p − 1) + n
am = ab(p−1) × an ≡ 1b × an ≡ an (modp)
q.e.d.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Security

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Security
Integer factorization and the RSA problem:

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Security
Integer factorization and the RSA problem:
The task of taking eth roots modulo a composite n,
recovering m, s.t. c ≡ me (modn).

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Security
Integer factorization and the RSA problem:
The task of taking eth roots modulo a composite n,
recovering m, s.t. c ≡ me (modn). For now, the most
promising approach is to factorize n

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Security
Integer factorization and the RSA problem:
The task of taking eth roots modulo a composite n,
recovering m, s.t. c ≡ me (modn). For now, the most
promising approach is to factorize n
Faulty key generation:

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Security
Integer factorization and the RSA problem:
The task of taking eth roots modulo a composite n,
recovering m, s.t. c ≡ me (modn). For now, the most
promising approach is to factorize n
Faulty key generation:
p and q should not be to close.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Security
Integer factorization and the RSA problem:
The task of taking eth roots modulo a composite n,
recovering m, s.t. c ≡ me (modn). For now, the most
promising approach is to factorize n
Faulty key generation:
p and q should not be to close.
if p − q < 2n1/4 (3 × 1077 ) - for a 1024-bit key, Fermat
factorization will make it trivial.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Strong number generator
p and q should be generated using a properly seeded with
adequate entropy random generator. This can be done seeding
the RNG with:
key stroke timings
electronic diode noise
atmospheric noise from a radio receiver tuned between
stations.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Breaking the RSA
Several RSA moduli have been factored:

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Breaking the RSA
Several RSA moduli have been factored:
RSA-768 (232 decimal digits) - 2009, December.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Breaking the RSA
Several RSA moduli have been factored:
RSA-768 (232 decimal digits) - 2009, December.
RSA-704 (212 decimal digits) - 2012, July.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Breaking the RSA
Several RSA moduli have been factored:
RSA-768 (232 decimal digits) - 2009, December.
RSA-704 (212 decimal digits) - 2012, July.
Prizes for breaking the keys:

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Breaking the RSA
Several RSA moduli have been factored:
RSA-768 (232 decimal digits) - 2009, December.
RSA-704 (212 decimal digits) - 2012, July.
Prizes for breaking the keys:
RSA-896 → $75, 000

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Breaking the RSA
Several RSA moduli have been factored:
RSA-768 (232 decimal digits) - 2009, December.
RSA-704 (212 decimal digits) - 2012, July.
Prizes for breaking the keys:
RSA-896 → $75, 000
RSA-1024 → $100, 000

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Breaking the RSA
Several RSA moduli have been factored:
RSA-768 (232 decimal digits) - 2009, December.
RSA-704 (212 decimal digits) - 2012, July.
Prizes for breaking the keys:
RSA-896 → $75, 000
RSA-1024 → $100, 000
RSA-1536 → $150, 000

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Breaking the RSA
Several RSA moduli have been factored:
RSA-768 (232 decimal digits) - 2009, December.
RSA-704 (212 decimal digits) - 2012, July.
Prizes for breaking the keys:
RSA-896 → $75, 000
RSA-1024 → $100, 000
RSA-1536 → $150, 000
RSA-2048 → $200, 000. - not really possible in near
future.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Thank you!

Questions?

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s

More Related Content

What's hot

Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystemSamdish Arora
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSASrilal Buddika
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithmKomal Singh
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmIndra97065
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE Qualcomm
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation swarnapatil
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography rinnocente
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithmSiva Rushi
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYQualcomm
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareProf. Swapnil V. Kaware
 

What's hot (20)

Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Rsa rivest shamir adleman
Rsa rivest shamir adlemanRsa rivest shamir adleman
Rsa rivest shamir adleman
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Rsa
RsaRsa
Rsa
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
RSA
RSARSA
RSA
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
 
Cryptography
CryptographyCryptography
Cryptography
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
 

Viewers also liked

Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSAPratik Poddar
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DESHuawei Technologies
 
Cryptography - RSA and ECDSA
Cryptography - RSA and ECDSACryptography - RSA and ECDSA
Cryptography - RSA and ECDSAAPNIC
 
Diffie-Hellman key exchange
Diffie-Hellman key exchangeDiffie-Hellman key exchange
Diffie-Hellman key exchangehughpearse
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 

Viewers also liked (20)

RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
Rsa Algorithm
Rsa AlgorithmRsa Algorithm
Rsa Algorithm
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
DES
DESDES
DES
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DES
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography - RSA and ECDSA
Cryptography - RSA and ECDSACryptography - RSA and ECDSA
Cryptography - RSA and ECDSA
 
Aes
AesAes
Aes
 
Diffie-Hellman key exchange
Diffie-Hellman key exchangeDiffie-Hellman key exchange
Diffie-Hellman key exchange
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 

Similar to RSA Algorithm

Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...CSCJournals
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)ArthyR3
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsaMohsin Ali
 
DNA steganography
DNA steganography DNA steganography
DNA steganography dzulfazawawi
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.Tuhin_Das
 
11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdfVipinNegi38
 
Introduction to Algorithms
Introduction to AlgorithmsIntroduction to Algorithms
Introduction to AlgorithmsVenkatesh Iyer
 
An implementation of RSA policy
An implementation of RSA policyAn implementation of RSA policy
An implementation of RSA policySM NAZMUS SALEHIN
 
Intrusion Prevention through Optimal Stopping and Self-Play
Intrusion Prevention through Optimal Stopping and Self-PlayIntrusion Prevention through Optimal Stopping and Self-Play
Intrusion Prevention through Optimal Stopping and Self-PlayKim Hammar
 
Genetic Algorithm Based Cryptographic Approach using Karnatic Music
Genetic Algorithm Based Cryptographic Approach using  Karnatic  MusicGenetic Algorithm Based Cryptographic Approach using  Karnatic  Music
Genetic Algorithm Based Cryptographic Approach using Karnatic MusicIRJET Journal
 

Similar to RSA Algorithm (20)

Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
 
DNA steganography
DNA steganography DNA steganography
DNA steganography
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
 
11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf
 
Final Report-1-(1)
Final Report-1-(1)Final Report-1-(1)
Final Report-1-(1)
 
F010243136
F010243136F010243136
F010243136
 
Introduction to Algorithms
Introduction to AlgorithmsIntroduction to Algorithms
Introduction to Algorithms
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 
An implementation of RSA policy
An implementation of RSA policyAn implementation of RSA policy
An implementation of RSA policy
 
Ch09
Ch09Ch09
Ch09
 
Intrusion Prevention through Optimal Stopping and Self-Play
Intrusion Prevention through Optimal Stopping and Self-PlayIntrusion Prevention through Optimal Stopping and Self-Play
Intrusion Prevention through Optimal Stopping and Self-Play
 
Genetic Algorithm Based Cryptographic Approach using Karnatic Music
Genetic Algorithm Based Cryptographic Approach using  Karnatic  MusicGenetic Algorithm Based Cryptographic Approach using  Karnatic  Music
Genetic Algorithm Based Cryptographic Approach using Karnatic Music
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 
11
1111
11
 
11
1111
11
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 

RSA Algorithm