SlideShare a Scribd company logo
RSA Encryption
• RSA is an asymmetric cryptography algorithm.
 Key Generation: Generating the keys to be used for encrypting and decrypting the data to be exchanged.
 Encryption/Decryption Function: The steps that need to be run when scrambling and recovering the data.
RSA Digital Signature
Digital signatures are used to verify the authenticity of the message sent electronically.
RSA – Rivest, Shamir, Adleman
What Is Asymmetric Encryption?
Public/Private Key Generation
• Public Key: Select two prime no's. Suppose P = 53 and Q = 59.
Now First part of the Public key : n = P*Q = 3127
Now z = (p-1)(q-1), Choose a number e where 1 < e < z. Let us now consider e as 3
c = (PQ^e) mod n
Our Public Key is made of n and e
• Private Key: We need to calculate Φ(n) :
Such that Φ(n) = (P-1)(Q-1)
so, Φ(n) = (53-1)(59-1)=(52)(58)=3016
Now calculate Private Key, d :
d = (k*Φ(n) + 1) / e for some integer k
For k = 2, d = (2*3016+1)/3 = (6032+1)/3 = (6033)/3 = 2011
value of d is 2011.
Let us encrypt/decrypt…
Now we are ready with our – Public Key ( n = 3127 and e = 3) and Private Key(d = 2011)
• Let us encrypt “HI”:
Convert letters to numbers : H = 8 and I = 9
Encrypted Data c = (ab^e) mod n
Encrypted Data c = (89e)mod n = (89*89*89)mod 3127 = (704969) mod 3127
Encrypted Data comes out to be 1394
• Now we will decrypt 1394 :
Decrypted Data = (c^d)mod n
Decrypted Data = (1394^d) mod 3127 = 89
Encrypted Data comes out to be 89
8 = H and I = 9 i.e. "HI".
RSA Digital Signature
RSA Digital Signature…
Code pointers
• integ_rsa_encrypt.c
• integ_rsa_decrypt.c
• integ_rsa_keygen.c
typedef struct _CpaCyRsaKeyGenOpData {
CpaFlatBuffer prime1P;
CpaFlatBuffer prime2Q;
Cpa32U modulusLenInBytes;
CpaCyRsaVersion version;
CpaCyRsaPrivateKeyRepType privateKeyRepType;
CpaFlatBuffer publicExponentE;
} CpaCyRsaKeyGenOpData;
Integ code
isg_cid_qat_sal/me_acceleration_layer/access_layer/look_aside_acceleration/integ_test/common/crypto/asym/rsa
typedef struct _CpaCyRsaEncryptOpData {
CpaCyRsaPublicKey *pPublicKey;
/**< Pointer to the public key. */
CpaFlatBuffer inputData;
/**< The input data that the RSA encryption primitive operation is
* performed on. The data pointed to is an integer that MUST be in big-
* endian order. The value MUST be between 0 and the modulus n - 1. */
} CpaCyRsaEncryptOpData;
typedef struct _CpaCyRsaDecryptOpData {
CpaCyRsaPrivateKey *pRecipientPrivateKey;
/**< Pointer to the recipient's RSA private key. */
CpaFlatBuffer inputData;
/**< The input data that the RSA decryption primitive operation is
* performed on. The data pointed to is an integer that MUST be in big-
* endian order. The value MUST be between 0 and the modulus n - 1. */
} CpaCyRsaDecryptOpData;
Code pointers…
Key Generation
LacIntegRsa_AllocKeyGenData
-LacIntegPke_CreatePrivateKey
-LacIntegPke_CreatePublicKey
LacIntegRsa_KeySendReq
-LacIntegRsa_KeySend
-cpaCyRsaGenKey -> SAL code
Encryption
LacIntegRsa_EncryptInt/LacIntegRsa_EncPerfTestInt
-LacIntegRsa_AllocEncData
-LacIntegPke_CreatePublicKey
-LacIntegPke_PopulateFlatBuffer
LacIntegRsa_EncPerfTestInt
-LacIntegRsa_EncSendReq
-LacIntegRsa_EncSend
-cpaCyRsaEncrypt ->SAL code
Decryption
LacIntegRsa_Decrypt1Int
->LacIntegRsa_AllocDec1Data
->LacIntegPke_CreatePrivateKey1
->LacIntegPke_PopulateFlatBuffer
LacIntegRsa_DecPerfTestInt
LacIntegRsa_DecSendReq
->LacIntegRsa_DecSend
->cpaCyRsaDecrypt -> SAL code

More Related Content

Similar to RSA.pptx

F010243136
F010243136F010243136
F010243136
IOSR Journals
 
3 pkc+rsa
3 pkc+rsa3 pkc+rsa
3 pkc+rsa
Shashank Mishra
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2
Fahad Layth
 
Rsa
RsaRsa
Cloud computing and security 03
Cloud computing and security 03Cloud computing and security 03
Cloud computing and security 03
Akash Kamble
 
Ch09
Ch09Ch09
PKC&RSA
PKC&RSAPKC&RSA
PKC&RSA
Anver S R
 
New ppt.ppt
New ppt.pptNew ppt.ppt
New ppt.ppt
ssuser4030a8
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
Srilal Buddika
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.ppt
RizwanBasha12
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSA
Mohamed Loey
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
Suresh Thammishetty
 
Rsa
RsaRsa
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
Samdish Arora
 
Ch9
Ch9Ch9
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Final ss2-digital-signature-group5
Final ss2-digital-signature-group5
Phan Minh
 
Research on RSA
Research on RSAResearch on RSA
Research on RSA
faizmajeed
 
rsa-1
rsa-1rsa-1
rsa-1
rsa-1rsa-1

Similar to RSA.pptx (20)

F010243136
F010243136F010243136
F010243136
 
3 pkc+rsa
3 pkc+rsa3 pkc+rsa
3 pkc+rsa
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2
 
Rsa
RsaRsa
Rsa
 
Cloud computing and security 03
Cloud computing and security 03Cloud computing and security 03
Cloud computing and security 03
 
Ch09
Ch09Ch09
Ch09
 
PKC&RSA
PKC&RSAPKC&RSA
PKC&RSA
 
New ppt.ppt
New ppt.pptNew ppt.ppt
New ppt.ppt
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.ppt
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSA
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Rsa
RsaRsa
Rsa
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
Ch9
Ch9Ch9
Ch9
 
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Final ss2-digital-signature-group5
Final ss2-digital-signature-group5
 
Research on RSA
Research on RSAResearch on RSA
Research on RSA
 
rsa-1
rsa-1rsa-1
rsa-1
 
rsa-1
rsa-1rsa-1
rsa-1
 

Recently uploaded

How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 

Recently uploaded (20)

How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 

RSA.pptx

  • 1. RSA Encryption • RSA is an asymmetric cryptography algorithm.  Key Generation: Generating the keys to be used for encrypting and decrypting the data to be exchanged.  Encryption/Decryption Function: The steps that need to be run when scrambling and recovering the data. RSA Digital Signature Digital signatures are used to verify the authenticity of the message sent electronically. RSA – Rivest, Shamir, Adleman
  • 2. What Is Asymmetric Encryption?
  • 3. Public/Private Key Generation • Public Key: Select two prime no's. Suppose P = 53 and Q = 59. Now First part of the Public key : n = P*Q = 3127 Now z = (p-1)(q-1), Choose a number e where 1 < e < z. Let us now consider e as 3 c = (PQ^e) mod n Our Public Key is made of n and e • Private Key: We need to calculate Φ(n) : Such that Φ(n) = (P-1)(Q-1) so, Φ(n) = (53-1)(59-1)=(52)(58)=3016 Now calculate Private Key, d : d = (k*Φ(n) + 1) / e for some integer k For k = 2, d = (2*3016+1)/3 = (6032+1)/3 = (6033)/3 = 2011 value of d is 2011.
  • 4. Let us encrypt/decrypt… Now we are ready with our – Public Key ( n = 3127 and e = 3) and Private Key(d = 2011) • Let us encrypt “HI”: Convert letters to numbers : H = 8 and I = 9 Encrypted Data c = (ab^e) mod n Encrypted Data c = (89e)mod n = (89*89*89)mod 3127 = (704969) mod 3127 Encrypted Data comes out to be 1394 • Now we will decrypt 1394 : Decrypted Data = (c^d)mod n Decrypted Data = (1394^d) mod 3127 = 89 Encrypted Data comes out to be 89 8 = H and I = 9 i.e. "HI".
  • 7. Code pointers • integ_rsa_encrypt.c • integ_rsa_decrypt.c • integ_rsa_keygen.c typedef struct _CpaCyRsaKeyGenOpData { CpaFlatBuffer prime1P; CpaFlatBuffer prime2Q; Cpa32U modulusLenInBytes; CpaCyRsaVersion version; CpaCyRsaPrivateKeyRepType privateKeyRepType; CpaFlatBuffer publicExponentE; } CpaCyRsaKeyGenOpData; Integ code isg_cid_qat_sal/me_acceleration_layer/access_layer/look_aside_acceleration/integ_test/common/crypto/asym/rsa typedef struct _CpaCyRsaEncryptOpData { CpaCyRsaPublicKey *pPublicKey; /**< Pointer to the public key. */ CpaFlatBuffer inputData; /**< The input data that the RSA encryption primitive operation is * performed on. The data pointed to is an integer that MUST be in big- * endian order. The value MUST be between 0 and the modulus n - 1. */ } CpaCyRsaEncryptOpData; typedef struct _CpaCyRsaDecryptOpData { CpaCyRsaPrivateKey *pRecipientPrivateKey; /**< Pointer to the recipient's RSA private key. */ CpaFlatBuffer inputData; /**< The input data that the RSA decryption primitive operation is * performed on. The data pointed to is an integer that MUST be in big- * endian order. The value MUST be between 0 and the modulus n - 1. */ } CpaCyRsaDecryptOpData;
  • 8. Code pointers… Key Generation LacIntegRsa_AllocKeyGenData -LacIntegPke_CreatePrivateKey -LacIntegPke_CreatePublicKey LacIntegRsa_KeySendReq -LacIntegRsa_KeySend -cpaCyRsaGenKey -> SAL code Encryption LacIntegRsa_EncryptInt/LacIntegRsa_EncPerfTestInt -LacIntegRsa_AllocEncData -LacIntegPke_CreatePublicKey -LacIntegPke_PopulateFlatBuffer LacIntegRsa_EncPerfTestInt -LacIntegRsa_EncSendReq -LacIntegRsa_EncSend -cpaCyRsaEncrypt ->SAL code Decryption LacIntegRsa_Decrypt1Int ->LacIntegRsa_AllocDec1Data ->LacIntegPke_CreatePrivateKey1 ->LacIntegPke_PopulateFlatBuffer LacIntegRsa_DecPerfTestInt LacIntegRsa_DecSendReq ->LacIntegRsa_DecSend ->cpaCyRsaDecrypt -> SAL code