Week 9paper
Week 9paper
and secure communications for the companies. One of the methods, which are used for the data
transmission in an encrypted format, is RSA, which stands as Rivest, Shamir, and Adleman, the creators
of the public key encryption technology, which is also identified as asymmetric encryption. The
asymmetric cryptography uses two different, but linked mathematical keys which are public key and
private key. The RSA algorithm was developed in the year 1977, though the public key was created by a
British mathematician in the year 1973, it was kept secret until 1997 ("What is RSA? Webopedia
Definition", n.d.).
The RSA algorithm was the origin of the cryptosystem, where the cryptosystem consists of a set of
algorithms that are used for certain security purposes during the data transmission over the internet. In the
RSA cryptography, to encrypt a message both the public and private keys can be used, and to decrypt the
opposite key should be used apart for the key that was used for encrypting ("What is RSA algorithm
(Rivest-Shamir-Adleman)? - Definition from WhatIs.com", n.d.).
The RSA methodology involves the key generation, encryption, decryption, and digital signature and its
verification.
Key generation:
• First, generate two large primes’ p and q of equal size
• Now compute n= pq and Ø = (p-1)(q-1) , where n is identified as the modulus
• Next, choose an integer e, 1<e<Ø, such that gcd (e, Ø) = 1, where e is the public exponent
• Now compute the secret exponent d, 1<d<Ø, such that ed ≡ 1 mod Ø, where d is the private exponent
Here the public key is (n,e) and the private key is (n,d)
Encryption:
Sender A Gets the public key (n,e) from Receiver B, now sender characterizes the plaintext message as
the positive integer m with 1<m<n. Then the sender A computes the ciphertext using the formula c=me
(mod n) and sends ciphertext c to the receiver B.
Decryption:
Receiver B uses the private key (n,d), now computes using the formula m = cd (mod n). Then B extracts
the plaintext from the message m.
Digital Signature and its Verification:
Sender A usually creates a message summary about the information and assigns integer m between n-1.
Then compute with formula s = md (mod n) using the private key and then sends the signature to receiver
B.
During verification receiver, B uses sender A public key to compute using formula v = se (mod n), then
computes the message summary H’ that has been signed, and later computes the assigned integer v’ with
message summary H’ by encoding. If the signature followed the value of v = v’ then it is valid (David
Ireland, n.d.).
The RSA mainly used for secure data transmission. This is used during the Secure Socket
Layer/Transport Layer Security sessions for authentication using the private key and asymmetric key. The
RSA is used in a wide range of software to authenticate the updates that are genuine and provided by the
company (life? & Bayat, n.d.).
Send a brief message (ten words minimum) using the Caesar Cypher:
The following is the message before decryption:
This is week nine assignment for the class Computer Security Foundations in Semester one at New
England College.