0% found this document useful (0 votes)
60 views

Week 9paper

The RSA algorithm uses a public/private key pair to encrypt and decrypt messages. It involves key generation where two large prime numbers are used to create the public and private keys. Encryption occurs when the sender encrypts a message using the recipient's public key. Decryption happens when the recipient decrypts it with their private key. Digital signatures can also be created and verified using this process.

Uploaded by

sivaabhilash
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views

Week 9paper

The RSA algorithm uses a public/private key pair to encrypt and decrypt messages. It involves key generation where two large prime numbers are used to create the public and private keys. Encryption occurs when the sender encrypts a message using the recipient's public key. Decryption happens when the recipient decrypts it with their private key. Digital signatures can also be created and verified using this process.

Uploaded by

sivaabhilash
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Technological development is a never-ending process, due to this reason, there is always a need for strong

and secure communications for the companies. One of the methods, which are used for the data
transmission in an encrypted format, is RSA, which stands as Rivest, Shamir, and Adleman, the creators
of the public key encryption technology, which is also identified as asymmetric encryption. The
asymmetric cryptography uses two different, but linked mathematical keys which are public key and
private key. The RSA algorithm was developed in the year 1977, though the public key was created by a
British mathematician in the year 1973, it was kept secret until 1997 ("What is RSA? Webopedia
Definition", n.d.).
The RSA algorithm was the origin of the cryptosystem, where the cryptosystem consists of a set of
algorithms that are used for certain security purposes during the data transmission over the internet. In the
RSA cryptography, to encrypt a message both the public and private keys can be used, and to decrypt the
opposite key should be used apart for the key that was used for encrypting ("What is RSA algorithm
(Rivest-Shamir-Adleman)? - Definition from WhatIs.com", n.d.).

The RSA methodology involves the key generation, encryption, decryption, and digital signature and its
verification.
Key generation:
• First, generate two large primes’ p and q of equal size
• Now compute n= pq and Ø = (p-1)(q-1) , where n is identified as the modulus
• Next, choose an integer e, 1<e<Ø, such that gcd (e, Ø) = 1, where e is the public exponent
• Now compute the secret exponent d, 1<d<Ø, such that ed ≡ 1 mod Ø, where d is the private exponent
Here the public key is (n,e) and the private key is (n,d)
Encryption:
Sender A Gets the public key (n,e) from Receiver B, now sender characterizes the plaintext message as
the positive integer m with 1<m<n. Then the sender A computes the ciphertext using the formula c=me
(mod n) and sends ciphertext c to the receiver B.
Decryption:
Receiver B uses the private key (n,d), now computes using the formula m = cd (mod n). Then B extracts
the plaintext from the message m.
Digital Signature and its Verification:
Sender A usually creates a message summary about the information and assigns integer m between n-1.
Then compute with formula s = md (mod n) using the private key and then sends the signature to receiver
B.
During verification receiver, B uses sender A public key to compute using formula v = se (mod n), then
computes the message summary H’ that has been signed, and later computes the assigned integer v’ with
message summary H’ by encoding. If the signature followed the value of v = v’ then it is valid (David
Ireland, n.d.).
The RSA mainly used for secure data transmission. This is used during the Secure Socket
Layer/Transport Layer Security sessions for authentication using the private key and asymmetric key. The
RSA is used in a wide range of software to authenticate the updates that are genuine and provided by the
company (life? & Bayat, n.d.).

Send a brief message (ten words minimum) using the Caesar Cypher:
The following is the message before decryption:
This is week nine assignment for the class Computer Security Foundations in Semester one at New
England College.

The following is the decrypted message:


Sghr hr vddj mhmd zrrhfmldms enq sgd bkzrr Bnlotsdq Rdbtqhsx Entmczshnmr hm Rdldrsdq nmd zs
Mdv Dmfkzmc Bnkkdfd. ("Caesar cipher: Encode and decode online", n.d.)

You might also like