SlideShare a Scribd company logo
1 of 72
Download to read offline
Introduction

Algorithm

Usage

Correctness

Security

RSA algorithm
Adrian Spataru
Department of Computer Science,
West University of Timi¸oara
s

October 30, 2013

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

1 Introduction
2 Algorithm
3 Usage
4 Correctness
5 Security

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

About

What is it?

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

About

What is it?
an algorithm for public key cryptography

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

About

What is it?
an algorithm for public key cryptography
based on the difficulty of factoring large integers.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

About

What is it?
an algorithm for public key cryptography
based on the difficulty of factoring large integers.
Where does the name come from?

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

About

What is it?
an algorithm for public key cryptography
based on the difficulty of factoring large integers.
Where does the name come from?
Ron
Rivest

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

About

What is it?
an algorithm for public key cryptography
based on the difficulty of factoring large integers.
Where does the name come from?
Ron
Rivest
Adi
Shamir

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

About

What is it?
an algorithm for public key cryptography
based on the difficulty of factoring large integers.
Where does the name come from?
Ron
Rivest
Adi
Shamir
Leonard Adleman

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Introduction

Where it’s being used?

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Introduction

Where it’s being used?
Communication

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Introduction

Where it’s being used?
Communication
Banks

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Introduction

Where it’s being used?
Communication
Banks
Signatures

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Introduction

Where it’s being used?
Communication
Banks
Signatures
Identity Certificates

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1

Adrian Spataru
RSA algorithm

Take p and q large prime numbers

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q
n is called the modulus and it is public

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q
n is called the modulus and it is public
Its length denotes the key length

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

3

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q
n is called the modulus and it is public
Its length denotes the key length
Compute ϕ(n) = (p − 1)(q − 1)

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

3

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q
n is called the modulus and it is public
Its length denotes the key length
Compute ϕ(n) = (p − 1)(q − 1)
ϕ is Euler’s totient function.

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

3

4

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q
n is called the modulus and it is public
Its length denotes the key length
Compute ϕ(n) = (p − 1)(q − 1)
ϕ is Euler’s totient function.
Choose e, s.t. 1 < e < ϕ(n) and gcd(e, ϕ(n)) = 1

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

3

4

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q
n is called the modulus and it is public
Its length denotes the key length
Compute ϕ(n) = (p − 1)(q − 1)
ϕ is Euler’s totient function.
Choose e, s.t. 1 < e < ϕ(n) and gcd(e, ϕ(n)) = 1
e is released as public exponent

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

3

4

5

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q
n is called the modulus and it is public
Its length denotes the key length
Compute ϕ(n) = (p − 1)(q − 1)
ϕ is Euler’s totient function.
Choose e, s.t. 1 < e < ϕ(n) and gcd(e, ϕ(n)) = 1
e is released as public exponent
Compute d as d −1 ≡ e(modϕ(n))

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

3

4

5

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q
n is called the modulus and it is public
Its length denotes the key length
Compute ϕ(n) = (p − 1)(q − 1)
ϕ is Euler’s totient function.
Choose e, s.t. 1 < e < ϕ(n) and gcd(e, ϕ(n)) = 1
e is released as public exponent
Compute d as d −1 ≡ e(modϕ(n)) or

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Algorithm
1
2

3

4

5

Adrian Spataru
RSA algorithm

Take p and q large prime numbers
Compute n = p × q
n is called the modulus and it is public
Its length denotes the key length
Compute ϕ(n) = (p − 1)(q − 1)
ϕ is Euler’s totient function.
Choose e, s.t. 1 < e < ϕ(n) and gcd(e, ϕ(n)) = 1
e is released as public exponent
Compute d as d −1 ≡ e(modϕ(n)) or
d × e ≡ 1(modϕ(n))

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Computing d

Let x = ϕ(n) + 1.
If x divides e → d = x/e
else x becomes x + ϕ(n)
repeat

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Example

Suppose p = 17 and q = 23.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Example

Suppose p = 17 and q = 23.
Then n (modulus) = 391

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Example

Suppose p = 17 and q = 23.
Then n (modulus) = 391
ϕ(n) = (16 × 22) = 352

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Example

Suppose p = 17 and q = 23.
Then n (modulus) = 391
ϕ(n) = (16 × 22) = 352
Let’s choose e = 3.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Example

Suppose p = 17 and q = 23.
Then n (modulus) = 391
ϕ(n) = (16 × 22) = 352
Let’s choose e = 3.
d = 1(modϕ(n)) = 235.
e

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Scenario

Traian wants to communicate with Angela via RSA encrypted
messages.
Both of them generate a RSA key-pair.
Traian gives to Angela his public key, and Angela gives to
Traian hers.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Encryption

Angela wants to send Traian the message M.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Encryption

Angela wants to send Traian the message M.
The message is turned into an integer m, 0 ≤ m < n.
based on a padding scheme
Angela computes c = me (modn) (e from Traian’s public key,
and sends this to Traian.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Decryption

Traian can recover the message with the formula
m = c d (modn).
Reverse the padding scheme to get the message.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Tricks

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Tricks
For encryption, exponentiation by squaring can save a lot
of time.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Tricks
For encryption, exponentiation by squaring can save a lot
of time.
For decryption, the Chinese remainder algorithm can be
used.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Tricks
For encryption, exponentiation by squaring can save a lot
of time.
For decryption, the Chinese remainder algorithm can be
used.
This algorithm stores in the private key several
precomputed values (dP , dQ , qinv ).
dP = d(modp − 1)

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Tricks
For encryption, exponentiation by squaring can save a lot
of time.
For decryption, the Chinese remainder algorithm can be
used.
This algorithm stores in the private key several
precomputed values (dP , dQ , qinv ).
dP = d(modp − 1)
dQ = d(modq − 1)

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Tricks
For encryption, exponentiation by squaring can save a lot
of time.
For decryption, the Chinese remainder algorithm can be
used.
This algorithm stores in the private key several
precomputed values (dP , dQ , qinv ).
dP = d(modp − 1)
dQ = d(modq − 1)
qinv = q −1 (modp)

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Tricks
For encryption, exponentiation by squaring can save a lot
of time.
For decryption, the Chinese remainder algorithm can be
used.
This algorithm stores in the private key several
precomputed values (dP , dQ , qinv ).
dP = d(modp − 1)
dQ = d(modq − 1)
qinv = q −1 (modp)
m1 = c dP (modp); m2 = c dQ (modq);

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Tricks
For encryption, exponentiation by squaring can save a lot
of time.
For decryption, the Chinese remainder algorithm can be
used.
This algorithm stores in the private key several
precomputed values (dP , dQ , qinv ).
dP = d(modp − 1)
dQ = d(modq − 1)
qinv = q −1 (modp)
m1 = c dP (modp); m2 = c dQ (modq);
h = qinv (m1 − m2)(modp)
Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Tricks
For encryption, exponentiation by squaring can save a lot
of time.
For decryption, the Chinese remainder algorithm can be
used.
This algorithm stores in the private key several
precomputed values (dP , dQ , qinv ).
dP = d(modp − 1)
dQ = d(modq − 1)
qinv = q −1 (modp)
m1 = c dP (modp); m2 = c dQ (modq);
h = qinv (m1 − m2)(modp)
m = m2 + hq
Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem

Theorem
Let p be a prime number
∀a - integer number, ap − a is multiple of p.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem

Theorem
Let p be a prime number
∀a - integer number, ap − a is multiple of p.
ap ≡ a(modp)

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem

Theorem
Let p be a prime number
∀a - integer number, ap − a is multiple of p.
ap ≡ a(modp)
If a is not divisible by p, then

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem

Theorem
Let p be a prime number
∀a - integer number, ap − a is multiple of p.
ap ≡ a(modp)
If a is not divisible by p, then
ap−1 ≡ 1(modp).

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem generalization
Theorem
If p is prime and m and n are positive integers s.t.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem generalization
Theorem
If p is prime and m and n are positive integers s.t.
m ≡ n(modϕ(p)),

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem generalization
Theorem
If p is prime and m and n are positive integers s.t.
m ≡ n(modϕ(p)), then ∀a, we have am ≡ an (modp).

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem generalization
Theorem
If p is prime and m and n are positive integers s.t.
m ≡ n(modϕ(p)), then ∀a, we have am ≡ an (modp).
m = b(p − 1) + n

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem generalization
Theorem
If p is prime and m and n are positive integers s.t.
m ≡ n(modϕ(p)), then ∀a, we have am ≡ an (modp).
m = b(p − 1) + n
am = ab(p−1) × an ≡ 1b × an ≡ an (modp)

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Fermat’s little theorem generalization
Theorem
If p is prime and m and n are positive integers s.t.
m ≡ n(modϕ(p)), then ∀a, we have am ≡ an (modp).
m = b(p − 1) + n
am = ab(p−1) × an ≡ 1b × an ≡ an (modp)
q.e.d.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Security

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Security
Integer factorization and the RSA problem:

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Security
Integer factorization and the RSA problem:
The task of taking eth roots modulo a composite n,
recovering m, s.t. c ≡ me (modn).

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Security
Integer factorization and the RSA problem:
The task of taking eth roots modulo a composite n,
recovering m, s.t. c ≡ me (modn). For now, the most
promising approach is to factorize n

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Security
Integer factorization and the RSA problem:
The task of taking eth roots modulo a composite n,
recovering m, s.t. c ≡ me (modn). For now, the most
promising approach is to factorize n
Faulty key generation:

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Security
Integer factorization and the RSA problem:
The task of taking eth roots modulo a composite n,
recovering m, s.t. c ≡ me (modn). For now, the most
promising approach is to factorize n
Faulty key generation:
p and q should not be to close.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Security
Integer factorization and the RSA problem:
The task of taking eth roots modulo a composite n,
recovering m, s.t. c ≡ me (modn). For now, the most
promising approach is to factorize n
Faulty key generation:
p and q should not be to close.
if p − q < 2n1/4 (3 × 1077 ) - for a 1024-bit key, Fermat
factorization will make it trivial.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Strong number generator
p and q should be generated using a properly seeded with
adequate entropy random generator. This can be done seeding
the RNG with:
key stroke timings
electronic diode noise
atmospheric noise from a radio receiver tuned between
stations.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Breaking the RSA
Several RSA moduli have been factored:

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Breaking the RSA
Several RSA moduli have been factored:
RSA-768 (232 decimal digits) - 2009, December.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Breaking the RSA
Several RSA moduli have been factored:
RSA-768 (232 decimal digits) - 2009, December.
RSA-704 (212 decimal digits) - 2012, July.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Breaking the RSA
Several RSA moduli have been factored:
RSA-768 (232 decimal digits) - 2009, December.
RSA-704 (212 decimal digits) - 2012, July.
Prizes for breaking the keys:

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Breaking the RSA
Several RSA moduli have been factored:
RSA-768 (232 decimal digits) - 2009, December.
RSA-704 (212 decimal digits) - 2012, July.
Prizes for breaking the keys:
RSA-896 → $75, 000

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Breaking the RSA
Several RSA moduli have been factored:
RSA-768 (232 decimal digits) - 2009, December.
RSA-704 (212 decimal digits) - 2012, July.
Prizes for breaking the keys:
RSA-896 → $75, 000
RSA-1024 → $100, 000

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Breaking the RSA
Several RSA moduli have been factored:
RSA-768 (232 decimal digits) - 2009, December.
RSA-704 (212 decimal digits) - 2012, July.
Prizes for breaking the keys:
RSA-896 → $75, 000
RSA-1024 → $100, 000
RSA-1536 → $150, 000

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Breaking the RSA
Several RSA moduli have been factored:
RSA-768 (232 decimal digits) - 2009, December.
RSA-704 (212 decimal digits) - 2012, July.
Prizes for breaking the keys:
RSA-896 → $75, 000
RSA-1024 → $100, 000
RSA-1536 → $150, 000
RSA-2048 → $200, 000. - not really possible in near
future.

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s
Introduction

Algorithm

Usage

Correctness

Security

Thank you!

Questions?

Adrian Spataru
RSA algorithm

Department of Computer Science, West University of Timi¸oara
s

More Related Content

What's hot

Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystemSamdish Arora
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSASrilal Buddika
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithmKomal Singh
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmIndra97065
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE Qualcomm
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation swarnapatil
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography rinnocente
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithmSiva Rushi
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYQualcomm
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareProf. Swapnil V. Kaware
 

What's hot (20)

Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Rsa rivest shamir adleman
Rsa rivest shamir adlemanRsa rivest shamir adleman
Rsa rivest shamir adleman
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Rsa
RsaRsa
Rsa
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
RSA
RSARSA
RSA
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
 
Cryptography
CryptographyCryptography
Cryptography
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
 

Viewers also liked

Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSAPratik Poddar
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DESHuawei Technologies
 
Cryptography - RSA and ECDSA
Cryptography - RSA and ECDSACryptography - RSA and ECDSA
Cryptography - RSA and ECDSAAPNIC
 
Diffie-Hellman key exchange
Diffie-Hellman key exchangeDiffie-Hellman key exchange
Diffie-Hellman key exchangehughpearse
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 

Viewers also liked (20)

RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
Rsa Algorithm
Rsa AlgorithmRsa Algorithm
Rsa Algorithm
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
DES
DESDES
DES
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DES
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography - RSA and ECDSA
Cryptography - RSA and ECDSACryptography - RSA and ECDSA
Cryptography - RSA and ECDSA
 
Aes
AesAes
Aes
 
Diffie-Hellman key exchange
Diffie-Hellman key exchangeDiffie-Hellman key exchange
Diffie-Hellman key exchange
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 

Similar to RSA Algorithm

Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...CSCJournals
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)ArthyR3
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsaMohsin Ali
 
DNA steganography
DNA steganography DNA steganography
DNA steganography dzulfazawawi
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.Tuhin_Das
 
11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdfVipinNegi38
 
Introduction to Algorithms
Introduction to AlgorithmsIntroduction to Algorithms
Introduction to AlgorithmsVenkatesh Iyer
 
An implementation of RSA policy
An implementation of RSA policyAn implementation of RSA policy
An implementation of RSA policySM NAZMUS SALEHIN
 
Intrusion Prevention through Optimal Stopping and Self-Play
Intrusion Prevention through Optimal Stopping and Self-PlayIntrusion Prevention through Optimal Stopping and Self-Play
Intrusion Prevention through Optimal Stopping and Self-PlayKim Hammar
 
Genetic Algorithm Based Cryptographic Approach using Karnatic Music
Genetic Algorithm Based Cryptographic Approach using  Karnatic  MusicGenetic Algorithm Based Cryptographic Approach using  Karnatic  Music
Genetic Algorithm Based Cryptographic Approach using Karnatic MusicIRJET Journal
 

Similar to RSA Algorithm (20)

Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
 
DNA steganography
DNA steganography DNA steganography
DNA steganography
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
 
11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf11 Applied_Mathemathics HANDBOOK.pdf
11 Applied_Mathemathics HANDBOOK.pdf
 
Final Report-1-(1)
Final Report-1-(1)Final Report-1-(1)
Final Report-1-(1)
 
F010243136
F010243136F010243136
F010243136
 
Introduction to Algorithms
Introduction to AlgorithmsIntroduction to Algorithms
Introduction to Algorithms
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 
An implementation of RSA policy
An implementation of RSA policyAn implementation of RSA policy
An implementation of RSA policy
 
Ch09
Ch09Ch09
Ch09
 
Intrusion Prevention through Optimal Stopping and Self-Play
Intrusion Prevention through Optimal Stopping and Self-PlayIntrusion Prevention through Optimal Stopping and Self-Play
Intrusion Prevention through Optimal Stopping and Self-Play
 
Genetic Algorithm Based Cryptographic Approach using Karnatic Music
Genetic Algorithm Based Cryptographic Approach using  Karnatic  MusicGenetic Algorithm Based Cryptographic Approach using  Karnatic  Music
Genetic Algorithm Based Cryptographic Approach using Karnatic Music
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 
11
1111
11
 
11
1111
11
 

Recently uploaded

Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationMJDuyan
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...CaraSkikne1
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxAditiChauhan701637
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17Celine George
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17Celine George
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesCeline George
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxheathfieldcps1
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17Celine George
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxEduSkills OECD
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice documentXsasf Sfdfasd
 
Philosophy of Education and Educational Philosophy
Philosophy of Education  and Educational PhilosophyPhilosophy of Education  and Educational Philosophy
Philosophy of Education and Educational PhilosophyShuvankar Madhu
 

Recently uploaded (20)

Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive Education
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptx
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 Sales
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice document
 
Philosophy of Education and Educational Philosophy
Philosophy of Education  and Educational PhilosophyPhilosophy of Education  and Educational Philosophy
Philosophy of Education and Educational Philosophy
 
Prelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quizPrelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quiz
 

RSA Algorithm