SlideShare a Scribd company logo
1 of 19
Mr . Sathish Kumar . M 
Department of Electronics and Communication 
Engineering 
I’ve learned that people will forget what you said, people will forget 
what you did, but people will never forget how you made them feel. 
–Maya Angelou
RivestShamir& Adleman 
MIT in 1977
What is RSA…? 
• RSA is an algorithm used by modern computers 
to encrypt and decrypt messages. 
• It is an asymmetric cryptographic algorithm. 
• It is included as part of the Web browsers from 
Microsoft and Netscape. 
• It's also part of Lotus Notes, Intuit's Quicken, and many 
other products.
RSA 
PUBLIC KEY PRIVATE KEY 
Public-key 
cryptography, also 
known as asymmetric 
cryptography, is a 
class 
of cryptographic 
algorithms 
Messages encrypted 
using the public key 
can only be 
decrypted with the 
private key.
OPERATION: 
• RSA involves a public key and private key. 
• The public key can be known to everyone, it is used to encrypt 
messages. 
• Messages encrypted using the public key can only be decrypted 
with the private key. 
The public key is used for encryption. 
• The key is known to the public . 
• The private key is used for decryption. 
• The key is only known to the 
owner .
The RSA algorithm involves three 
steps: key generation, encryption and decryption.
Why RSA…? 
• It developed to address two key issues: 
• Key distribution – how to have secure 
communications in general without having to 
trust a KDC with your key 
• Digital signatures – how to verify a message 
comes intact from the claimed sender
RSA CHARACTERISTICS: 
 Public-Key algorithms rely on two keys with the characteristics 
that it is: 
 computationally infeasible to find decryption key knowing 
only algorithm & encryption key 
 computationally easy to en/decrypt messages when the 
relevant (en/decrypt) key is known 
 either of the two related keys can be used for encryption, 
with the other used for decryption (in some schemes)
One-way function with trapdoor 
f 
x y 
x y 
x y 
 
f 
 
1 
 
f 
 
1 
 
trapdoor 
Easy: 
Hard: 
Easy: 
Use trapdoor 
as the private key. 
Many public-key cryptosystems are 
based on trapdoor one-way fu 
 
nctions.
RSA 
 
1 
RSA 
 
Idea behind RSA 
* 
It works in group 
Z 
Encryption (easy): 
Decryption (hard): 
Looking for a trapdoor: ( ) . 
If is a number such that 1mod ( ), then 
( ) 
1 
. 
e 
e 
e d 
n 
x x 
x x 
x x 
d ed n 
e d k 
n 
 
 
 
 
 
  
k 
for some , and 
  ( ) 1 ( ) 
k 
e d ed n k n 
x x x x x x x           
( ) 1 .
Integers 
a b a b a b 
 
| : divides , is a divisor of . 
 
gcd( a , b ): greatest common divisor of a and b 
. 
 Coprime or relatively prime: gcd( a , b 
)  
1. 
 
Euclid's algorithm: computes gcd( a , b 
). 
 Extented Eucl 
id's algorithm: computes integers 
x and y such that ax  by  gcd(a,b).
Euler Totient Function ø(n) 
• when doing arithmetic modulo n 
• complete set of residues is: 0..n-1 
• reduced set of residues is those numbers (residues) which are 
relatively prime to n 
eg for n=10, 
• complete set of residues is {0,1,2,3,4,5,6,7,8,9} 
• reduced set of residues is {1,3,7,9} 
• number of elements in reduced set of residues is called the Euler 
Totient Function ø(n)
Euler Totient Function ø(n) 
• when doing arithmetic modulo n 
• complete set of residues is: 0..n-1 
• reduced set of residues is those numbers (residues) which are 
relatively prime to n 
• eg for n=10, 
• complete set of residues is {0,1,2,3,4,5,6,7,8,9} 
• reduced set of residues is {1,3,7,9} 
• number of elements in reduced set of residues is called the 
Euler Totient Function ø(n)
Euler Totient Function ø(n) 
• when doing arithmetic modulo n 
• complete set of residues is: 0..n-1 
• reduced set of residues is those numbers (residues) which 
are relatively prime to n 
eg for n=10, 
• complete set of residues is {0,1,2,3,4,5,6,7,8,9} 
• reduced set of residues is {1,3,7,9} 
• number of elements in reduced set of residues is called the 
Euler Totient Function ø(n)
RSA ALGORITH EXAMPLE 
Choose p = 3 and q = 11 
Compute n = p * q = 3 * 11 = 33 
Compute φ(n) = (p - 1) * (q - 1) = 2 * 10 = 20 
Choose e such that 1 < e < φ(n) and e and n are coprime. Let e = 7 
Compute a value for d such that (d * e) % φ(n) = 1. One solution is d = 3 [(3 * 
7) % 20 = 1] 
Public key is (e, n) => (7, 33) 
Private key is (d, n) => (3, 33) 
The encryption ofm = 2 isc = 27 % 33 = 29 
The decryption ofc = 29 ism = 293 % 33 = 2
RSA ALGORITHM

More Related Content

What's hot

Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithmSunita Kharayat
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption StandardPrince Rachit
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its UsesMohsin Ali
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyMd. Shafiul Alam Sagor
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationsarhadisoftengg
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptographyzahid-mian
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standardVasuki Ramasamy
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONraf_slide
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSADr.Florence Dayana
 

What's hot (20)

Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Cryptography
CryptographyCryptography
Cryptography
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 

Similar to RSA ALGORITHM

Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic EncryptionGöktuğ Serez
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystemSamdish Arora
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberTarek Gaber
 
Broadcasting and low exponent rsa attack
Broadcasting and low exponent rsa attackBroadcasting and low exponent rsa attack
Broadcasting and low exponent rsa attackAnkita Kapratwar
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithmKomal Singh
 
Python Programming - IX. On Randomness
Python Programming - IX. On RandomnessPython Programming - IX. On Randomness
Python Programming - IX. On RandomnessRanel Padon
 
CNIT 141: 10. RSA
CNIT 141: 10. RSACNIT 141: 10. RSA
CNIT 141: 10. RSASam Bowne
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network SecurityDr. Rupa Ch
 
An Analysis of RSA Public Exponent e
An Analysis of RSA Public Exponent eAn Analysis of RSA Public Exponent e
An Analysis of RSA Public Exponent eDharmalingam Ganesan
 

Similar to RSA ALGORITHM (20)

Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
PKC&RSA
PKC&RSAPKC&RSA
PKC&RSA
 
Class3
Class3Class3
Class3
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
Computing on Encrypted Data
Computing on Encrypted DataComputing on Encrypted Data
Computing on Encrypted Data
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Broadcasting and low exponent rsa attack
Broadcasting and low exponent rsa attackBroadcasting and low exponent rsa attack
Broadcasting and low exponent rsa attack
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
Python Programming - IX. On Randomness
Python Programming - IX. On RandomnessPython Programming - IX. On Randomness
Python Programming - IX. On Randomness
 
The rsa algorithm JooSeok Song
The rsa algorithm JooSeok SongThe rsa algorithm JooSeok Song
The rsa algorithm JooSeok Song
 
CNIT 141: 10. RSA
CNIT 141: 10. RSACNIT 141: 10. RSA
CNIT 141: 10. RSA
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
3 pkc+rsa
3 pkc+rsa3 pkc+rsa
3 pkc+rsa
 
An Analysis of RSA Public Exponent e
An Analysis of RSA Public Exponent eAn Analysis of RSA Public Exponent e
An Analysis of RSA Public Exponent e
 
Ch9
Ch9Ch9
Ch9
 

More from Sathish Kumar

LabVIEW Based Monitoring the Building in wireless communication
LabVIEW Based Monitoring the Building in wireless communicationLabVIEW Based Monitoring the Building in wireless communication
LabVIEW Based Monitoring the Building in wireless communicationSathish Kumar
 
7 layers of osi models
7 layers of osi models7 layers of osi models
7 layers of osi modelsSathish Kumar
 
Labview based wireless sensor for monitoring the building
Labview based wireless sensor for monitoring the buildingLabview based wireless sensor for monitoring the building
Labview based wireless sensor for monitoring the buildingSathish Kumar
 
V3 i4 ijertv3is040482
V3 i4 ijertv3is040482V3 i4 ijertv3is040482
V3 i4 ijertv3is040482Sathish Kumar
 
Modulation techniques
Modulation techniquesModulation techniques
Modulation techniquesSathish Kumar
 

More from Sathish Kumar (10)

Home security
Home securityHome security
Home security
 
Interview questions
Interview questionsInterview questions
Interview questions
 
LabVIEW Based Monitoring the Building in wireless communication
LabVIEW Based Monitoring the Building in wireless communicationLabVIEW Based Monitoring the Building in wireless communication
LabVIEW Based Monitoring the Building in wireless communication
 
Labview Basics
Labview BasicsLabview Basics
Labview Basics
 
7 layers of osi models
7 layers of osi models7 layers of osi models
7 layers of osi models
 
Labview based wireless sensor for monitoring the building
Labview based wireless sensor for monitoring the buildingLabview based wireless sensor for monitoring the building
Labview based wireless sensor for monitoring the building
 
Mysteries
MysteriesMysteries
Mysteries
 
V3 i4 ijertv3is040482
V3 i4 ijertv3is040482V3 i4 ijertv3is040482
V3 i4 ijertv3is040482
 
Modulation techniques
Modulation techniquesModulation techniques
Modulation techniques
 
System hardware
System hardwareSystem hardware
System hardware
 

Recently uploaded

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 

Recently uploaded (20)

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 

RSA ALGORITHM

  • 1. Mr . Sathish Kumar . M Department of Electronics and Communication Engineering I’ve learned that people will forget what you said, people will forget what you did, but people will never forget how you made them feel. –Maya Angelou
  • 3. What is RSA…? • RSA is an algorithm used by modern computers to encrypt and decrypt messages. • It is an asymmetric cryptographic algorithm. • It is included as part of the Web browsers from Microsoft and Netscape. • It's also part of Lotus Notes, Intuit's Quicken, and many other products.
  • 4. RSA PUBLIC KEY PRIVATE KEY Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic algorithms Messages encrypted using the public key can only be decrypted with the private key.
  • 5.
  • 6. OPERATION: • RSA involves a public key and private key. • The public key can be known to everyone, it is used to encrypt messages. • Messages encrypted using the public key can only be decrypted with the private key. The public key is used for encryption. • The key is known to the public . • The private key is used for decryption. • The key is only known to the owner .
  • 7. The RSA algorithm involves three steps: key generation, encryption and decryption.
  • 8. Why RSA…? • It developed to address two key issues: • Key distribution – how to have secure communications in general without having to trust a KDC with your key • Digital signatures – how to verify a message comes intact from the claimed sender
  • 9.
  • 10. RSA CHARACTERISTICS:  Public-Key algorithms rely on two keys with the characteristics that it is:  computationally infeasible to find decryption key knowing only algorithm & encryption key  computationally easy to en/decrypt messages when the relevant (en/decrypt) key is known  either of the two related keys can be used for encryption, with the other used for decryption (in some schemes)
  • 11.
  • 12. One-way function with trapdoor f x y x y x y  f  1  f  1  trapdoor Easy: Hard: Easy: Use trapdoor as the private key. Many public-key cryptosystems are based on trapdoor one-way fu  nctions.
  • 13. RSA  1 RSA  Idea behind RSA * It works in group Z Encryption (easy): Decryption (hard): Looking for a trapdoor: ( ) . If is a number such that 1mod ( ), then ( ) 1 . e e e d n x x x x x x d ed n e d k n        k for some , and   ( ) 1 ( ) k e d ed n k n x x x x x x x           ( ) 1 .
  • 14. Integers a b a b a b  | : divides , is a divisor of .  gcd( a , b ): greatest common divisor of a and b .  Coprime or relatively prime: gcd( a , b )  1.  Euclid's algorithm: computes gcd( a , b ).  Extented Eucl id's algorithm: computes integers x and y such that ax  by  gcd(a,b).
  • 15. Euler Totient Function ø(n) • when doing arithmetic modulo n • complete set of residues is: 0..n-1 • reduced set of residues is those numbers (residues) which are relatively prime to n eg for n=10, • complete set of residues is {0,1,2,3,4,5,6,7,8,9} • reduced set of residues is {1,3,7,9} • number of elements in reduced set of residues is called the Euler Totient Function ø(n)
  • 16. Euler Totient Function ø(n) • when doing arithmetic modulo n • complete set of residues is: 0..n-1 • reduced set of residues is those numbers (residues) which are relatively prime to n • eg for n=10, • complete set of residues is {0,1,2,3,4,5,6,7,8,9} • reduced set of residues is {1,3,7,9} • number of elements in reduced set of residues is called the Euler Totient Function ø(n)
  • 17. Euler Totient Function ø(n) • when doing arithmetic modulo n • complete set of residues is: 0..n-1 • reduced set of residues is those numbers (residues) which are relatively prime to n eg for n=10, • complete set of residues is {0,1,2,3,4,5,6,7,8,9} • reduced set of residues is {1,3,7,9} • number of elements in reduced set of residues is called the Euler Totient Function ø(n)
  • 18. RSA ALGORITH EXAMPLE Choose p = 3 and q = 11 Compute n = p * q = 3 * 11 = 33 Compute φ(n) = (p - 1) * (q - 1) = 2 * 10 = 20 Choose e such that 1 < e < φ(n) and e and n are coprime. Let e = 7 Compute a value for d such that (d * e) % φ(n) = 1. One solution is d = 3 [(3 * 7) % 20 = 1] Public key is (e, n) => (7, 33) Private key is (d, n) => (3, 33) The encryption ofm = 2 isc = 27 % 33 = 29 The decryption ofc = 29 ism = 293 % 33 = 2