SlideShare ist ein Scribd-Unternehmen logo
1 von 16
1
RSA: Rivest Shamir
Adleman
RSA: Rivest Shamir AdlemanRSA: Rivest Shamir Adleman
 RSA is one of the first practical public-key algorithm and is
widely used for secure data transmission.
 Of all the public-key algorithms proposed over the years, RSA
is by far the easiest to understand and implement.
 The algorithm is named after the three inventors—Ron
Rivest, Adi Shamir, and Leonard Adleman
 The RSA algorithm was publicly described in 1977 by Rivest,
Shamir, and Adleman at MIT
RSA: AlgorithmRSA: Algorithm
 Just like the public key cryptography, in RSA the encryption key
is public and the decryption key is private, which is kept secret.
In RSA, this asymmetry is based on the practical difficulty of
factoring the product of two large prime numbers.
 RSA gets its security from the difficulty of factoring large
numbers. The public and private keys are functions of a pair of
large prime numbers (100 to 200 digits or even larger).
 A user of RSA creates and then publishes a public key based on
the two large prime numbers, along with an auxiliary value. The
prime numbers must be kept secret. Anyone can use the public
key to encrypt a message, but with currently published
methods. If the public key is large enough, only someone with
knowledge of the prime numbers can feasibly decode the
message.
RSA: AlgorithmRSA: Algorithm
 The RSA algorithm can be analyzed in three phases:
1. Getting the Message Ready
2. Key generation
3. Message Encryption
4. Message Decryption
5
RSA: Getting ReadyRSA: Getting Ready
 In RSA we represent a message by its equivalent integer value.
1. We can represent a message as a binary bit pattern.
2. And a bit pattern can be uniquely represented by a
decimal integer number.
3. Thus we can consider that encrypting a message is
equivalent to encrypting its corresponding decimal integer
number.
4. Example: Let we want to encrypt the message “m”
5. Now we know m= 10010001 . So this message can be uniquely
represented by the decimal number 145 which is equal to
(10010001)2 .
6. To encrypt m, we encrypt the corresponding number 145,
which gives a new number (the cyphertext).
6
RSA: Key GenerationRSA: Key Generation
1. Choose two large prime numbers p, q.
(e.g., 1024 bits each)
2. Compute n = pq, z = (p-1)(q-1)
3. Choose encryption key e (with e<n) that has no common
factors with z. (that is e and z are “relatively prime”).
4. Calculate decryption key d such that ed-1 is exactly
divisible by z. (in other words: ed mod z = 1 implies
d=e-1
mod z
5. Public key is (n,e). Private key is (n,d).
KB
+
KB
-
7
RSA: Encryption & DecryptionRSA: Encryption & Decryption
 Given public key (n,e) and private key (n,d)
1. To encrypt message m (<n), compute
c = m mod ne
2. To decrypt received bit pattern, c, compute
m = c mod nd
m = (m mod n)e mod n
dMagic
happens!
c
How RSA Works?How RSA Works?
9
Analyze: Key GenerationAnalyze: Key Generation
 To generate the two keys, choose two random large prime
numbers, p and q. For maximum security, choose p and q of
equal length. Then compute the products.
 Then randomly choose the encryption key, e, such that e and
z=(p - 1)(q - 1) are relatively prime.
 Finally, use the extended Euclidean algorithm to compute the
decryption key, d, such that ed-1 is exactly divisible by z. That is
ed mod z = 1 or d=e-1
mod z
1. Choose two large prime numbers p, q.
(e.g., 1024 bits each)
2. Compute n = pq, z = (p-1)(q-1)
10
RSA Example:RSA Example:
Now Alice chooses p=5, q=7. Then n=35, z=24.
e=5 (so e, z relatively prime).
d=29 (so ed-1 exactly divisible by z).
bit pattern m me c = m mod ne
00001100 12 24832 17
encrypt:
Encrypting 8-bit messages.
 Consider that Alice wants to a message whose
equivalent binary bit pattern is 00001100 to Alice
Given 00001100=12 as plaintext, Alice send its ciphertext
17 to Bob
11
RSA Example:RSA Example:
c m = c mod nd
17 481968572106750915091411825223071697 12
c
d
decrypt:
 Now at the receiver end Bob receives 17 as the
ciphertext. Then Bob decrypt the ciphertext to
recover the plaintext.
Upon receiving 17 as ciphertext Bob decrypts it to
recover the plaintext 00001100=12
RSA ExampleRSA Example
13
Why does RSA work?Why does RSA work?
 We have to show that cd
mod n = m , where c = me
mod n
 Now we know that: for any x and y
xy
mod n = x(ymodz)
mod n , where n= pq and z = (p-1)(q-1)
 Then cd
mod n = (me
mod n)d
mod n [ as c = me
mod n ]
= med
mod n
= m(edmodz)
mod n [For d we have ed mod z =1]
= m1
mod n
= m
14
Attacks Against RSAAttacks Against RSA
 There are a number of attacks against plain RSA as described
below:
 When encrypting with low encryption exponents (e.g., e = 3)
and small values of the m, ciphertexts can be easily decrypted
 If the same clear text message is sent to bob or more recipients
and the receivers share the same exponent e, but different p, q,
and n, then it is easy to decrypt the original clear text message
via the Chinese remainder theorem
 It is vulnerable to chosen plaintext attack.
ReferencesReferences
 http://en.wikipedia.org/wiki/
 Applied Cryptography by Bruce Schneier; 10th
Anniversary
edition
16
Md. Shakhawat Hossain
Student of Department of Computer Science &
Engineering
University of Rajshahi
E-mail: mshimul86@gmail.com

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSASrilal Buddika
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithmSunita Kharayat
 
Asymmetric Cryptography.pptx
Asymmetric Cryptography.pptxAsymmetric Cryptography.pptx
Asymmetric Cryptography.pptxdiaa46
 
RSA Algm.pptx
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptxSou Jana
 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsaMazin Alwaaly
 
Rsa algorithm (rivest shamir-adleman)
Rsa algorithm (rivest shamir-adleman)Rsa algorithm (rivest shamir-adleman)
Rsa algorithm (rivest shamir-adleman)ManishKumarGiri2
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation swarnapatil
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptxssuserd24233
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5koolkampus
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptographyanusachu .
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2Fahad Layth
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 

Was ist angesagt? (20)

Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Asymmetric Cryptography.pptx
Asymmetric Cryptography.pptxAsymmetric Cryptography.pptx
Asymmetric Cryptography.pptx
 
Ipsec
IpsecIpsec
Ipsec
 
RSA Algm.pptx
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptx
 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
 
Rsa algorithm (rivest shamir-adleman)
Rsa algorithm (rivest shamir-adleman)Rsa algorithm (rivest shamir-adleman)
Rsa algorithm (rivest shamir-adleman)
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
 
Cryptography
Cryptography Cryptography
Cryptography
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 

Andere mochten auch

A Diagnostic Algorithm for Factor XIII Deficiency in Iran,
A Diagnostic Algorithm for Factor XIII Deficiency in Iran,A Diagnostic Algorithm for Factor XIII Deficiency in Iran,
A Diagnostic Algorithm for Factor XIII Deficiency in Iran,Akbar Dorgalaleh
 
Turing100@Persistent | Life and Work of Ronald L. Rivest, Adi Shamir & Leonar...
Turing100@Persistent | Life and Work of Ronald L. Rivest, Adi Shamir & Leonar...Turing100@Persistent | Life and Work of Ronald L. Rivest, Adi Shamir & Leonar...
Turing100@Persistent | Life and Work of Ronald L. Rivest, Adi Shamir & Leonar...Pratyush Rao
 
Middle East Contact Centre BenchmarkingPrelim Results V1.1
Middle East Contact Centre BenchmarkingPrelim Results V1.1Middle East Contact Centre BenchmarkingPrelim Results V1.1
Middle East Contact Centre BenchmarkingPrelim Results V1.1Paul Scott
 
Introduction to Mindstorm Ltd
Introduction to Mindstorm LtdIntroduction to Mindstorm Ltd
Introduction to Mindstorm Ltdmindstormltd
 
Lab1. calculator
Lab1. calculatorLab1. calculator
Lab1. calculatorebagsh
 
Breakthroughs in the treatment of acute promyelocytic leukemia: curable disea...
Breakthroughs in the treatment of acute promyelocytic leukemia: curable disea...Breakthroughs in the treatment of acute promyelocytic leukemia: curable disea...
Breakthroughs in the treatment of acute promyelocytic leukemia: curable disea...spa718
 
Global Contact Centre Benchmarking Report 2015 CCW Berlin
Global Contact Centre Benchmarking Report 2015 CCW BerlinGlobal Contact Centre Benchmarking Report 2015 CCW Berlin
Global Contact Centre Benchmarking Report 2015 CCW BerlinPaul Scott
 
Acute Promyelocytic Leukemia
Acute Promyelocytic LeukemiaAcute Promyelocytic Leukemia
Acute Promyelocytic Leukemiaspa718
 
Laboratory approach to bleeding disorders
Laboratory approach to bleeding disordersLaboratory approach to bleeding disorders
Laboratory approach to bleeding disordersAshish Jawarkar
 
Acute promyelocytic leukemia NCCN LATEST 2014 Guidelines
Acute promyelocytic leukemia NCCN LATEST 2014 GuidelinesAcute promyelocytic leukemia NCCN LATEST 2014 Guidelines
Acute promyelocytic leukemia NCCN LATEST 2014 GuidelinesDr Sandeep Kumar
 
Introduction to Biomedical Imaging
Introduction to Biomedical ImagingIntroduction to Biomedical Imaging
Introduction to Biomedical Imagingu.surgery
 
Basic image manipulation tutorial
Basic image manipulation tutorialBasic image manipulation tutorial
Basic image manipulation tutorialHelen Bruce
 

Andere mochten auch (20)

A Diagnostic Algorithm for Factor XIII Deficiency in Iran,
A Diagnostic Algorithm for Factor XIII Deficiency in Iran,A Diagnostic Algorithm for Factor XIII Deficiency in Iran,
A Diagnostic Algorithm for Factor XIII Deficiency in Iran,
 
Turing100@Persistent | Life and Work of Ronald L. Rivest, Adi Shamir & Leonar...
Turing100@Persistent | Life and Work of Ronald L. Rivest, Adi Shamir & Leonar...Turing100@Persistent | Life and Work of Ronald L. Rivest, Adi Shamir & Leonar...
Turing100@Persistent | Life and Work of Ronald L. Rivest, Adi Shamir & Leonar...
 
Introduction to Medical Imaging
Introduction to Medical ImagingIntroduction to Medical Imaging
Introduction to Medical Imaging
 
Ch7 2ed
Ch7 2edCh7 2ed
Ch7 2ed
 
Middle East Contact Centre BenchmarkingPrelim Results V1.1
Middle East Contact Centre BenchmarkingPrelim Results V1.1Middle East Contact Centre BenchmarkingPrelim Results V1.1
Middle East Contact Centre BenchmarkingPrelim Results V1.1
 
Introduction to Mindstorm Ltd
Introduction to Mindstorm LtdIntroduction to Mindstorm Ltd
Introduction to Mindstorm Ltd
 
Lab1. calculator
Lab1. calculatorLab1. calculator
Lab1. calculator
 
Islamic jurisprudence
Islamic jurisprudenceIslamic jurisprudence
Islamic jurisprudence
 
Breakthroughs in the treatment of acute promyelocytic leukemia: curable disea...
Breakthroughs in the treatment of acute promyelocytic leukemia: curable disea...Breakthroughs in the treatment of acute promyelocytic leukemia: curable disea...
Breakthroughs in the treatment of acute promyelocytic leukemia: curable disea...
 
Global Contact Centre Benchmarking Report 2015 CCW Berlin
Global Contact Centre Benchmarking Report 2015 CCW BerlinGlobal Contact Centre Benchmarking Report 2015 CCW Berlin
Global Contact Centre Benchmarking Report 2015 CCW Berlin
 
Acute Promyelocytic Leukemia
Acute Promyelocytic LeukemiaAcute Promyelocytic Leukemia
Acute Promyelocytic Leukemia
 
Laboratory approach to bleeding disorders
Laboratory approach to bleeding disordersLaboratory approach to bleeding disorders
Laboratory approach to bleeding disorders
 
Flow cytometry
Flow cytometryFlow cytometry
Flow cytometry
 
Acute promyelocytic leukemia NCCN LATEST 2014 Guidelines
Acute promyelocytic leukemia NCCN LATEST 2014 GuidelinesAcute promyelocytic leukemia NCCN LATEST 2014 Guidelines
Acute promyelocytic leukemia NCCN LATEST 2014 Guidelines
 
Bucket sort
Bucket sortBucket sort
Bucket sort
 
Decision making and branching
Decision making and branchingDecision making and branching
Decision making and branching
 
History of computing
History of computingHistory of computing
History of computing
 
Introduction to Biomedical Imaging
Introduction to Biomedical ImagingIntroduction to Biomedical Imaging
Introduction to Biomedical Imaging
 
Basic image manipulation tutorial
Basic image manipulation tutorialBasic image manipulation tutorial
Basic image manipulation tutorial
 
Hashing
HashingHashing
Hashing
 

Ähnlich wie Rsa rivest shamir adleman

CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfBhuvanaR13
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithmSiva Rushi
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmVinayak Raja
 
RSA Algorithm.ppt
RSA Algorithm.pptRSA Algorithm.ppt
RSA Algorithm.pptArchanaT30
 
Twenty years of attacks on the rsa cryptosystem
Twenty years of attacks on the rsa cryptosystemTwenty years of attacks on the rsa cryptosystem
Twenty years of attacks on the rsa cryptosystemlinzi320
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsaMohsin Ali
 
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptxRivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptxwerip98386
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemIAEME Publication
 
AbstractRSA cryptosystem was first discovered in 1977 by Adi Shi.docx
AbstractRSA cryptosystem was first discovered in 1977 by Adi Shi.docxAbstractRSA cryptosystem was first discovered in 1977 by Adi Shi.docx
AbstractRSA cryptosystem was first discovered in 1977 by Adi Shi.docxransayo
 

Ähnlich wie Rsa rivest shamir adleman (20)

CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdf
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
RSA Algorithm.ppt
RSA Algorithm.pptRSA Algorithm.ppt
RSA Algorithm.ppt
 
Rsa
RsaRsa
Rsa
 
Rsa
RsaRsa
Rsa
 
rsa-1
rsa-1rsa-1
rsa-1
 
rsa-1
rsa-1rsa-1
rsa-1
 
rsa-1
rsa-1rsa-1
rsa-1
 
Ch09
Ch09Ch09
Ch09
 
Twenty years of attacks on the rsa cryptosystem
Twenty years of attacks on the rsa cryptosystemTwenty years of attacks on the rsa cryptosystem
Twenty years of attacks on the rsa cryptosystem
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
F010243136
F010243136F010243136
F010243136
 
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptxRivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystem
 
AbstractRSA cryptosystem was first discovered in 1977 by Adi Shi.docx
AbstractRSA cryptosystem was first discovered in 1977 by Adi Shi.docxAbstractRSA cryptosystem was first discovered in 1977 by Adi Shi.docx
AbstractRSA cryptosystem was first discovered in 1977 by Adi Shi.docx
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 
Presentation
PresentationPresentation
Presentation
 

Mehr von Hossain Md Shakhawat

Mehr von Hossain Md Shakhawat (20)

Recipe for the effective presentaion
Recipe for the effective presentaionRecipe for the effective presentaion
Recipe for the effective presentaion
 
The Road to Higher study in Japan
The Road to Higher study in JapanThe Road to Higher study in Japan
The Road to Higher study in Japan
 
Application of dfs
Application of dfsApplication of dfs
Application of dfs
 
Breadth first search and depth first search
Breadth first search and  depth first searchBreadth first search and  depth first search
Breadth first search and depth first search
 
Jpeg compression
Jpeg compressionJpeg compression
Jpeg compression
 
Surah Fatiha
Surah FatihaSurah Fatiha
Surah Fatiha
 
Decision making and looping
Decision making and loopingDecision making and looping
Decision making and looping
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Introduction to programming with c,
Introduction to programming with c,Introduction to programming with c,
Introduction to programming with c,
 
Introduction to digital image processing
Introduction to digital image processingIntroduction to digital image processing
Introduction to digital image processing
 
Introduction to Printers
Introduction to PrintersIntroduction to Printers
Introduction to Printers
 
Input devices_(Mouse and Keyboard)
Input devices_(Mouse and Keyboard)Input devices_(Mouse and Keyboard)
Input devices_(Mouse and Keyboard)
 
Binary search tree(bst)
Binary search tree(bst)Binary search tree(bst)
Binary search tree(bst)
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Counting sort(Non Comparison Sort)
Counting sort(Non Comparison Sort)Counting sort(Non Comparison Sort)
Counting sort(Non Comparison Sort)
 
Introduction to digital system
Introduction to digital systemIntroduction to digital system
Introduction to digital system
 
Web engineering cse ru
Web engineering cse ruWeb engineering cse ru
Web engineering cse ru
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 

Kürzlich hochgeladen

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 

Kürzlich hochgeladen (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

Rsa rivest shamir adleman

  • 2. RSA: Rivest Shamir AdlemanRSA: Rivest Shamir Adleman  RSA is one of the first practical public-key algorithm and is widely used for secure data transmission.  Of all the public-key algorithms proposed over the years, RSA is by far the easiest to understand and implement.  The algorithm is named after the three inventors—Ron Rivest, Adi Shamir, and Leonard Adleman  The RSA algorithm was publicly described in 1977 by Rivest, Shamir, and Adleman at MIT
  • 3. RSA: AlgorithmRSA: Algorithm  Just like the public key cryptography, in RSA the encryption key is public and the decryption key is private, which is kept secret. In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers.  RSA gets its security from the difficulty of factoring large numbers. The public and private keys are functions of a pair of large prime numbers (100 to 200 digits or even larger).  A user of RSA creates and then publishes a public key based on the two large prime numbers, along with an auxiliary value. The prime numbers must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods. If the public key is large enough, only someone with knowledge of the prime numbers can feasibly decode the message.
  • 4. RSA: AlgorithmRSA: Algorithm  The RSA algorithm can be analyzed in three phases: 1. Getting the Message Ready 2. Key generation 3. Message Encryption 4. Message Decryption
  • 5. 5 RSA: Getting ReadyRSA: Getting Ready  In RSA we represent a message by its equivalent integer value. 1. We can represent a message as a binary bit pattern. 2. And a bit pattern can be uniquely represented by a decimal integer number. 3. Thus we can consider that encrypting a message is equivalent to encrypting its corresponding decimal integer number. 4. Example: Let we want to encrypt the message “m” 5. Now we know m= 10010001 . So this message can be uniquely represented by the decimal number 145 which is equal to (10010001)2 . 6. To encrypt m, we encrypt the corresponding number 145, which gives a new number (the cyphertext).
  • 6. 6 RSA: Key GenerationRSA: Key Generation 1. Choose two large prime numbers p, q. (e.g., 1024 bits each) 2. Compute n = pq, z = (p-1)(q-1) 3. Choose encryption key e (with e<n) that has no common factors with z. (that is e and z are “relatively prime”). 4. Calculate decryption key d such that ed-1 is exactly divisible by z. (in other words: ed mod z = 1 implies d=e-1 mod z 5. Public key is (n,e). Private key is (n,d). KB + KB -
  • 7. 7 RSA: Encryption & DecryptionRSA: Encryption & Decryption  Given public key (n,e) and private key (n,d) 1. To encrypt message m (<n), compute c = m mod ne 2. To decrypt received bit pattern, c, compute m = c mod nd m = (m mod n)e mod n dMagic happens! c
  • 8. How RSA Works?How RSA Works?
  • 9. 9 Analyze: Key GenerationAnalyze: Key Generation  To generate the two keys, choose two random large prime numbers, p and q. For maximum security, choose p and q of equal length. Then compute the products.  Then randomly choose the encryption key, e, such that e and z=(p - 1)(q - 1) are relatively prime.  Finally, use the extended Euclidean algorithm to compute the decryption key, d, such that ed-1 is exactly divisible by z. That is ed mod z = 1 or d=e-1 mod z 1. Choose two large prime numbers p, q. (e.g., 1024 bits each) 2. Compute n = pq, z = (p-1)(q-1)
  • 10. 10 RSA Example:RSA Example: Now Alice chooses p=5, q=7. Then n=35, z=24. e=5 (so e, z relatively prime). d=29 (so ed-1 exactly divisible by z). bit pattern m me c = m mod ne 00001100 12 24832 17 encrypt: Encrypting 8-bit messages.  Consider that Alice wants to a message whose equivalent binary bit pattern is 00001100 to Alice Given 00001100=12 as plaintext, Alice send its ciphertext 17 to Bob
  • 11. 11 RSA Example:RSA Example: c m = c mod nd 17 481968572106750915091411825223071697 12 c d decrypt:  Now at the receiver end Bob receives 17 as the ciphertext. Then Bob decrypt the ciphertext to recover the plaintext. Upon receiving 17 as ciphertext Bob decrypts it to recover the plaintext 00001100=12
  • 13. 13 Why does RSA work?Why does RSA work?  We have to show that cd mod n = m , where c = me mod n  Now we know that: for any x and y xy mod n = x(ymodz) mod n , where n= pq and z = (p-1)(q-1)  Then cd mod n = (me mod n)d mod n [ as c = me mod n ] = med mod n = m(edmodz) mod n [For d we have ed mod z =1] = m1 mod n = m
  • 14. 14 Attacks Against RSAAttacks Against RSA  There are a number of attacks against plain RSA as described below:  When encrypting with low encryption exponents (e.g., e = 3) and small values of the m, ciphertexts can be easily decrypted  If the same clear text message is sent to bob or more recipients and the receivers share the same exponent e, but different p, q, and n, then it is easy to decrypt the original clear text message via the Chinese remainder theorem  It is vulnerable to chosen plaintext attack.
  • 15. ReferencesReferences  http://en.wikipedia.org/wiki/  Applied Cryptography by Bruce Schneier; 10th Anniversary edition
  • 16. 16 Md. Shakhawat Hossain Student of Department of Computer Science & Engineering University of Rajshahi E-mail: mshimul86@gmail.com