SlideShare a Scribd company logo
OBEKPA MARK ECHE
P13SCMT8013
COSC 808:DATASECURITY
AND ENCRYPTION
 The Rivest-Shamir-Adleman (RSA) algorithm is the
most widely acceptable and implemented public key
encryption.
 The RSA algorithm was developed in 1977 by Ron
Rivest, Adi Shamir and Len Adleman at
Massachusette Institute of Technology ( MIT).
 RSA is a block cipher in which plaintext and cipher
text are between 0 and n-1 for some n.
 Typically n is 1024bits≡309 decimal digits ≡ n < 2 1024
 If the block size is i, then 2i < n ≤ 2i+1
 Encryption and decryption follow these steps for a plaintext
M, and ciphertext block C.
Encryption c=me (mod n)
Decryption m= cd (mod n)
Public key {e, n}
Private key {d,n}
Requirement/ Problems
 Are there values of e, d, n such that med=m (mod n) for all m?
 Easy computation of me mod n and cd (mod n).
 Use exponation rule in modular arithmetics for example 2 50 =4 (mod 5)
 Infeasibility to determine d given e and n.
 Use factorisable large numbers that are difficult to factorise.
Let med=m (mod n)
Since bases are equal equate powers
ed=1 (mod n)
d= 1/e (mod n)
d=e-1 (mod n)
Inference
The identity med=m stands only if d is the multiplicative
inverse of e (mod n)
 The RSA algorithm involves three steps
• Key generation
• Encryption
• Decryption.
Key Generation
1. Choose two distinct prime numbers p and q.
2. Compute the modulo n=p*q.
3. Compute φ (pq) = (p-1)*(q-1)
4. Choose any integer e that is coprime with φ(n) such that
1<e≤φ(n).
5. Select d such that d=e-1 (mod φ(n) )
Encryption
Calculate the ciphertext c from the plain text msuch that c = me (mod n)
Decryption
m=cd (mod n)
 Choose p = 3 and q = 11
 Compute n = p * q = 3 * 11 = 33
 Compute φ(n) = (p -1)* (q-1)= 2 * 10 = 20
 Choose e such that 1 < e < φ(n) and e and n
are coprime. Let e = 7
 Compute a value for d such that (d * e) mod φ(n)
= 1. One solution is d = 3
 Public key is (e, n) => (7, 33)
 Private key is (d, n) => (3, 33)
 The encryption of m = 2 is c = 27 % 33 = 29
 The decryption of c = 29 is m = 293 % 33 = 2
Fermat Little theorem
 If p is prime and p does not divide an integer a then ap-1
=1 (mod p). --------------(1)
Aim
To show that med=m (mod pq) for every integer m when p
and q are distinct prime numbers and e and d are positive
integers satisfying
ed≡1 mod((p-1)(q-1)) -----------(2)
Proof
From (2)
ed -1≡ h(p-1)(q-1) for some non negative integer h
To show that med ≡ m (mod pq) it is sufficient and
equivalent to show that they are congruent mod p and
mod q separately.
 To show that med ≡ m (mod p) consider two cases
 Case1 (m ≡ 0)
med ≡0; therefore med is a multiple of p.
med ≡0 ≡ m (mod p)
 Case 2 (m≠ 0)
med ≡ m(ed-1+1) (mod p)
med ≡ m(ed-1)*m (mod p)
med ≡ m*mh(p-1)(q-1) (mod p)
med ≡ m*(m(p-1))h(q-1) apply Fermat Little theorem
med ≡ m*1h(q-1) (mod p)
med ≡ m (mod p)
Similarly using the same approach it can be shown that
med ≡ m (mod q)
This conclude the proof that for any integer m,
med ≡ m (mod pq)

More Related Content

What's hot

The RSA Algorithm
The RSA AlgorithmThe RSA Algorithm
The RSA Algorithm
ANTONY P SAIJI
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate provider
Kishankant Yadav
 
9th polynomial test_paper-2
9th polynomial test_paper-29th polynomial test_paper-2
9th polynomial test_paper-2
Anshay Gupta
 
Fuzzy dm
Fuzzy dmFuzzy dm
Bch and reed solomon codes generation in frequency domain
Bch and reed solomon codes generation in frequency domainBch and reed solomon codes generation in frequency domain
Bch and reed solomon codes generation in frequency domain
Madhumita Tamhane
 
Bresenham derivation
Bresenham derivationBresenham derivation
Bresenham derivation
Kumar
 
Justesen codes alternant codes goppa codes
Justesen codes alternant codes goppa codesJustesen codes alternant codes goppa codes
Justesen codes alternant codes goppa codes
Madhumita Tamhane
 
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
IOSR Journals
 
Asymptotes | WORKING PRINCIPLE OF ASYMPTOTES
Asymptotes | WORKING PRINCIPLE OF ASYMPTOTESAsymptotes | WORKING PRINCIPLE OF ASYMPTOTES
Asymptotes | WORKING PRINCIPLE OF ASYMPTOTES
NITESH POONIA
 
Dijkstra's Algorithm
Dijkstra's AlgorithmDijkstra's Algorithm
Dijkstra's Algorithm
guest862df4e
 
one + 1
one + 1one + 1
Java Polymorphism
Java PolymorphismJava Polymorphism
Java Polymorphism
AathikaJava
 
SMU MCA SEM 1 FALL 2016 ASSIGNMENTS
SMU MCA SEM 1 FALL 2016 ASSIGNMENTSSMU MCA SEM 1 FALL 2016 ASSIGNMENTS
SMU MCA SEM 1 FALL 2016 ASSIGNMENTS
solved_assignments
 
Finding Zero
Finding ZeroFinding Zero
Finding Zero
selmat64
 
Elgamal digital signature
Elgamal digital signatureElgamal digital signature
Elgamal digital signature
MDKAWSARAHMEDSAGAR
 
Effective approaches to attention based neural machine translation
Effective approaches to attention based neural machine translationEffective approaches to attention based neural machine translation
Effective approaches to attention based neural machine translation
성환 홍
 
Edited Per4 Analytic Geometry
Edited Per4 Analytic GeometryEdited Per4 Analytic Geometry
Edited Per4 Analytic Geometry
ingroy
 
Benginning Calculus Lecture notes 13 - fundamental theorem of calculus 1 & 2
Benginning Calculus Lecture notes 13 - fundamental theorem of calculus 1 & 2Benginning Calculus Lecture notes 13 - fundamental theorem of calculus 1 & 2
Benginning Calculus Lecture notes 13 - fundamental theorem of calculus 1 & 2
basyirstar
 

What's hot (18)

The RSA Algorithm
The RSA AlgorithmThe RSA Algorithm
The RSA Algorithm
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate provider
 
9th polynomial test_paper-2
9th polynomial test_paper-29th polynomial test_paper-2
9th polynomial test_paper-2
 
Fuzzy dm
Fuzzy dmFuzzy dm
Fuzzy dm
 
Bch and reed solomon codes generation in frequency domain
Bch and reed solomon codes generation in frequency domainBch and reed solomon codes generation in frequency domain
Bch and reed solomon codes generation in frequency domain
 
Bresenham derivation
Bresenham derivationBresenham derivation
Bresenham derivation
 
Justesen codes alternant codes goppa codes
Justesen codes alternant codes goppa codesJustesen codes alternant codes goppa codes
Justesen codes alternant codes goppa codes
 
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
Design and Implementation of Encoder for (15, k) Binary BCH Code Using VHDL a...
 
Asymptotes | WORKING PRINCIPLE OF ASYMPTOTES
Asymptotes | WORKING PRINCIPLE OF ASYMPTOTESAsymptotes | WORKING PRINCIPLE OF ASYMPTOTES
Asymptotes | WORKING PRINCIPLE OF ASYMPTOTES
 
Dijkstra's Algorithm
Dijkstra's AlgorithmDijkstra's Algorithm
Dijkstra's Algorithm
 
one + 1
one + 1one + 1
one + 1
 
Java Polymorphism
Java PolymorphismJava Polymorphism
Java Polymorphism
 
SMU MCA SEM 1 FALL 2016 ASSIGNMENTS
SMU MCA SEM 1 FALL 2016 ASSIGNMENTSSMU MCA SEM 1 FALL 2016 ASSIGNMENTS
SMU MCA SEM 1 FALL 2016 ASSIGNMENTS
 
Finding Zero
Finding ZeroFinding Zero
Finding Zero
 
Elgamal digital signature
Elgamal digital signatureElgamal digital signature
Elgamal digital signature
 
Effective approaches to attention based neural machine translation
Effective approaches to attention based neural machine translationEffective approaches to attention based neural machine translation
Effective approaches to attention based neural machine translation
 
Edited Per4 Analytic Geometry
Edited Per4 Analytic GeometryEdited Per4 Analytic Geometry
Edited Per4 Analytic Geometry
 
Benginning Calculus Lecture notes 13 - fundamental theorem of calculus 1 & 2
Benginning Calculus Lecture notes 13 - fundamental theorem of calculus 1 & 2Benginning Calculus Lecture notes 13 - fundamental theorem of calculus 1 & 2
Benginning Calculus Lecture notes 13 - fundamental theorem of calculus 1 & 2
 

Viewers also liked

Preguntas curiosas
Preguntas curiosasPreguntas curiosas
Preguntas curiosas
Leslie Noemi Guevara Pinedo
 
Asher's history
Asher's historyAsher's history
Asher's history
kristinsmith79
 
Ijetr021228
Ijetr021228Ijetr021228
Ijetr021126
Ijetr021126Ijetr021126
Ijetr021139
Ijetr021139Ijetr021139
042913
042913042913
042913
pannomion
 
General docs 1
General docs 1General docs 1
General docs 1
Katerin Colcha
 
Welcome to the cherry channel
Welcome to the cherry channelWelcome to the cherry channel
Welcome to the cherry channel
Doris Walker
 
O&A
O&AO&A
Local Resources
Local ResourcesLocal Resources
Local Resources
npangark
 
저녁있는 삶으로 인도하는 통합된 업무환경 : Office365 솔루션즈로 나의 업무환경 스마트하게 통합하기_조규승 원노트 MVP / 트루인포
저녁있는 삶으로 인도하는 통합된 업무환경 : Office365 솔루션즈로 나의 업무환경 스마트하게 통합하기_조규승 원노트 MVP / 트루인포저녁있는 삶으로 인도하는 통합된 업무환경 : Office365 솔루션즈로 나의 업무환경 스마트하게 통합하기_조규승 원노트 MVP / 트루인포
저녁있는 삶으로 인도하는 통합된 업무환경 : Office365 솔루션즈로 나의 업무환경 스마트하게 통합하기_조규승 원노트 MVP / 트루인포
NpoITcenter_Kor
 
Ijetr021264
Ijetr021264Ijetr021264
Valorizzazione della Darsena di Milano
Valorizzazione della Darsena di MilanoValorizzazione della Darsena di Milano
Valorizzazione della Darsena di Milano
SOLAVA
 
Avaliação monitor de informática
Avaliação   monitor de informáticaAvaliação   monitor de informática
Avaliação monitor de informática
Arnaldo Santos
 
Ijmctr042006
Ijmctr042006Ijmctr042006
Meowmeowemwoewmew
MeowmeowemwoewmewMeowmeowemwoewmew
Meowmeowemwoewmew
Gabriela Duarte
 

Viewers also liked (18)

Preguntas curiosas
Preguntas curiosasPreguntas curiosas
Preguntas curiosas
 
Asher's history
Asher's historyAsher's history
Asher's history
 
Ijetr021228
Ijetr021228Ijetr021228
Ijetr021228
 
Ijetr021126
Ijetr021126Ijetr021126
Ijetr021126
 
Ijetr021139
Ijetr021139Ijetr021139
Ijetr021139
 
презентація ман вступне засідання
презентація ман вступне засіданняпрезентація ман вступне засідання
презентація ман вступне засідання
 
042913
042913042913
042913
 
General docs 1
General docs 1General docs 1
General docs 1
 
Welcome to the cherry channel
Welcome to the cherry channelWelcome to the cherry channel
Welcome to the cherry channel
 
O&A
O&AO&A
O&A
 
Local Resources
Local ResourcesLocal Resources
Local Resources
 
저녁있는 삶으로 인도하는 통합된 업무환경 : Office365 솔루션즈로 나의 업무환경 스마트하게 통합하기_조규승 원노트 MVP / 트루인포
저녁있는 삶으로 인도하는 통합된 업무환경 : Office365 솔루션즈로 나의 업무환경 스마트하게 통합하기_조규승 원노트 MVP / 트루인포저녁있는 삶으로 인도하는 통합된 업무환경 : Office365 솔루션즈로 나의 업무환경 스마트하게 통합하기_조규승 원노트 MVP / 트루인포
저녁있는 삶으로 인도하는 통합된 업무환경 : Office365 솔루션즈로 나의 업무환경 스마트하게 통합하기_조규승 원노트 MVP / 트루인포
 
Ijetr021264
Ijetr021264Ijetr021264
Ijetr021264
 
Valorizzazione della Darsena di Milano
Valorizzazione della Darsena di MilanoValorizzazione della Darsena di Milano
Valorizzazione della Darsena di Milano
 
Avaliação monitor de informática
Avaliação   monitor de informáticaAvaliação   monitor de informática
Avaliação monitor de informática
 
Ijmctr042006
Ijmctr042006Ijmctr042006
Ijmctr042006
 
Bautizo ainoa
Bautizo ainoaBautizo ainoa
Bautizo ainoa
 
Meowmeowemwoewmew
MeowmeowemwoewmewMeowmeowemwoewmew
Meowmeowemwoewmew
 

Similar to RSA

Cryptanalysis Project Report
Cryptanalysis Project ReportCryptanalysis Project Report
Cryptanalysis Project Report
shahparin
 
Rsa
RsaRsa
Rsa
RsaRsa
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2
Fahad Layth
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
Siva Rushi
 
Rsa documentation
Rsa documentationRsa documentation
Rsa documentation
Farag Zakaria
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
Abhishek Gautam
 
RSA Algorithm.ppt
RSA Algorithm.pptRSA Algorithm.ppt
RSA Algorithm.ppt
ArchanaT30
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA Encryption
Nathan F. Dunn
 
Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...
FahmiOlayah
 
1508.07756v1
1508.07756v11508.07756v1
1508.07756v1
Samir Crypticus
 
How to invent a new cryptosystem.pdf
How to invent a new cryptosystem.pdfHow to invent a new cryptosystem.pdf
How to invent a new cryptosystem.pdf
MihailIulianPlea1
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
chauhankapil
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Shashank Shetty
 
01 - DAA - PPT.pptx
01 - DAA - PPT.pptx01 - DAA - PPT.pptx
01 - DAA - PPT.pptx
KokilaK25
 
RSA final notation change2
RSA final notation change2RSA final notation change2
RSA final notation change2
Coleman Gorham
 
MFCS-17.ppt
MFCS-17.pptMFCS-17.ppt
MFCS-17.ppt
SharmaDeep4
 
Unit 3
Unit 3Unit 3
DAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptxDAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptx
vaishnavi339314
 

Similar to RSA (20)

Cryptanalysis Project Report
Cryptanalysis Project ReportCryptanalysis Project Report
Cryptanalysis Project Report
 
Rsa
RsaRsa
Rsa
 
Rsa
RsaRsa
Rsa
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
Rsa documentation
Rsa documentationRsa documentation
Rsa documentation
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
RSA Algorithm.ppt
RSA Algorithm.pptRSA Algorithm.ppt
RSA Algorithm.ppt
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA Encryption
 
Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...
 
1508.07756v1
1508.07756v11508.07756v1
1508.07756v1
 
How to invent a new cryptosystem.pdf
How to invent a new cryptosystem.pdfHow to invent a new cryptosystem.pdf
How to invent a new cryptosystem.pdf
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
01 - DAA - PPT.pptx
01 - DAA - PPT.pptx01 - DAA - PPT.pptx
01 - DAA - PPT.pptx
 
RSA final notation change2
RSA final notation change2RSA final notation change2
RSA final notation change2
 
MFCS-17.ppt
MFCS-17.pptMFCS-17.ppt
MFCS-17.ppt
 
Unit 3
Unit 3Unit 3
Unit 3
 
DAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptxDAA - UNIT 4 - Engineering.pptx
DAA - UNIT 4 - Engineering.pptx
 

Recently uploaded

在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
mz5nrf0n
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative AnalysisOdoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Envertis Software Solutions
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Top 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptxTop 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptx
devvsandy
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
GohKiangHock
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
Marcin Chrost
 
316895207-SAP-Oil-and-Gas-Downstream-Training.pptx
316895207-SAP-Oil-and-Gas-Downstream-Training.pptx316895207-SAP-Oil-and-Gas-Downstream-Training.pptx
316895207-SAP-Oil-and-Gas-Downstream-Training.pptx
ssuserad3af4
 

Recently uploaded (20)

在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative AnalysisOdoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Top 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptxTop 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptx
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
 
316895207-SAP-Oil-and-Gas-Downstream-Training.pptx
316895207-SAP-Oil-and-Gas-Downstream-Training.pptx316895207-SAP-Oil-and-Gas-Downstream-Training.pptx
316895207-SAP-Oil-and-Gas-Downstream-Training.pptx
 

RSA

  • 1. OBEKPA MARK ECHE P13SCMT8013 COSC 808:DATASECURITY AND ENCRYPTION
  • 2.
  • 3.  The Rivest-Shamir-Adleman (RSA) algorithm is the most widely acceptable and implemented public key encryption.  The RSA algorithm was developed in 1977 by Ron Rivest, Adi Shamir and Len Adleman at Massachusette Institute of Technology ( MIT).  RSA is a block cipher in which plaintext and cipher text are between 0 and n-1 for some n.  Typically n is 1024bits≡309 decimal digits ≡ n < 2 1024  If the block size is i, then 2i < n ≤ 2i+1
  • 4.  Encryption and decryption follow these steps for a plaintext M, and ciphertext block C. Encryption c=me (mod n) Decryption m= cd (mod n) Public key {e, n} Private key {d,n} Requirement/ Problems  Are there values of e, d, n such that med=m (mod n) for all m?  Easy computation of me mod n and cd (mod n).  Use exponation rule in modular arithmetics for example 2 50 =4 (mod 5)  Infeasibility to determine d given e and n.  Use factorisable large numbers that are difficult to factorise.
  • 5. Let med=m (mod n) Since bases are equal equate powers ed=1 (mod n) d= 1/e (mod n) d=e-1 (mod n) Inference The identity med=m stands only if d is the multiplicative inverse of e (mod n)
  • 6.  The RSA algorithm involves three steps • Key generation • Encryption • Decryption. Key Generation 1. Choose two distinct prime numbers p and q. 2. Compute the modulo n=p*q. 3. Compute φ (pq) = (p-1)*(q-1) 4. Choose any integer e that is coprime with φ(n) such that 1<e≤φ(n). 5. Select d such that d=e-1 (mod φ(n) ) Encryption Calculate the ciphertext c from the plain text msuch that c = me (mod n) Decryption m=cd (mod n)
  • 7.  Choose p = 3 and q = 11  Compute n = p * q = 3 * 11 = 33  Compute φ(n) = (p -1)* (q-1)= 2 * 10 = 20  Choose e such that 1 < e < φ(n) and e and n are coprime. Let e = 7  Compute a value for d such that (d * e) mod φ(n) = 1. One solution is d = 3  Public key is (e, n) => (7, 33)  Private key is (d, n) => (3, 33)  The encryption of m = 2 is c = 27 % 33 = 29  The decryption of c = 29 is m = 293 % 33 = 2
  • 8. Fermat Little theorem  If p is prime and p does not divide an integer a then ap-1 =1 (mod p). --------------(1) Aim To show that med=m (mod pq) for every integer m when p and q are distinct prime numbers and e and d are positive integers satisfying ed≡1 mod((p-1)(q-1)) -----------(2) Proof From (2) ed -1≡ h(p-1)(q-1) for some non negative integer h To show that med ≡ m (mod pq) it is sufficient and equivalent to show that they are congruent mod p and mod q separately.
  • 9.  To show that med ≡ m (mod p) consider two cases  Case1 (m ≡ 0) med ≡0; therefore med is a multiple of p. med ≡0 ≡ m (mod p)  Case 2 (m≠ 0) med ≡ m(ed-1+1) (mod p) med ≡ m(ed-1)*m (mod p) med ≡ m*mh(p-1)(q-1) (mod p) med ≡ m*(m(p-1))h(q-1) apply Fermat Little theorem med ≡ m*1h(q-1) (mod p) med ≡ m (mod p) Similarly using the same approach it can be shown that med ≡ m (mod q) This conclude the proof that for any integer m, med ≡ m (mod pq)