Rsa Algorithm
Rsa Algorithm
Rsa Algorithm
com
0000011110101011010000111010011110001111001011110110000100001001101011011100010111101101000100010000011101101111000001111000001111001011110001110010010100001101011000011010010110101101001001001100101100101011000001110100110110111101100000010010010101001101000001111010101101000011101001111000111100101111011000010000100110101101110001011110110100010001000001110110111100000111100000111100101111000111
0010010100001101011000011010010110101101001001001100101100101011000001110100110110111101100000010010010101001101000001111010101101000011101001111000111100101111011000010000100110101101110001011110110100010001000001110110111100000111100000111100101111000111001001010000110101100001101001011010110100100100110010110010101100000111010011011011110110000001001001010100110100000111101010110100001110100111
1000111100101111011000010000100110101101110001011110110100010001000001110110111100000111100000111100101111000111001001010000110101100001101001011010110100100100110010110010101100000111010011011011110110000001001001010100110100000111101010110100001110100111100011110010111101100001000010011010110111000101111011010001000100000111011011110000011110000011110010111100011100100101000011010110000110100101
1010110100100100110010110010101100000111010011011011110110000001001001010100110100000111101010110100001110100111100011110010111101100001000010011010110111000101111011010001000100000111011011110000011110000011110010111100011100100101000011010110000110100101101011010010010011001011001010110000011101001101101111011000000100100101010011010000011110101011010000111010011110001111001011110110000100001001
RSA : An Insight
ABSTRACT
This paper describes in general the design and working of the Rivest-Shamir-
Adleman algorithm commonly known by the name RSA algorithm. It is a public key
cryptosystem that makes use of a pair of keys, namely the public and the private
key.
Public key cryptosystems were invented in the late 1970's, with some help from the
development of complexity theory around that time. It was observed that based on a
problem so difficult that it would need thousands of years to solve, and with some
luck, a cryptosystem could be developed which would have two keys, a secret key
and a public key. With the public key one could encrypt messages, and decrypt them
with the private key. Thus the owner of the private key would be the only one who
could decrypt the messages, but anyone knowing the public key could send them in
privacy.
The RSA cryptosystem, named after its inventors R. Rivest, A. Shamir, and L.
Adleman, is the most widely used public-key cryptosystem. It may be used to
provide both secrecy and digital signatures and its security is based on the
intractability of the integer factorization problem.
This paper presents an insight into RSA and explorers its intricacies and its
characteristics, which make it the most sought after asymmetric key algorithm till
date.
Introduction:
Cryptography has been in practical use for a very long time. While it may well have
been used previously, extant records indicate that the Spartans established the first
system of military cryptography. As early as the fifth century B.C., they employed a
device called the 'skytale' [which] consists of a staff of wood around which a strip of
papyrus or leather or parchment is wrapped close-packed. The secret message is
written on the parchment down the length of the staff; the parchment is then
unwound and sent on its way.
The existence of cryptography from this early a time, proves that there was a need
for data security from a very long time.
Cryptographic algorithms have been in existence from the time of Shakespeare (as
mentioned in Julius Caesar). This is from where the Caesar algorithm gets its name
from, wherein, a letter is encrypted by replacing it with a letter relative to its position
in the alphabet.
With an increase in the need for securing the data, the level of complexity involved
to get through to encrypted data also increased. Algorithms with
“keys” to encode and decode the data were developed.
the encryption key), whereas asymmetric algorithms use a different key for
encryption and decryption, and the decryption key cannot be derived from the
encryption key.
Asymmetric ciphers (also called public-key algorithms or generally public-key
cryptography) permit the encryption key to be public (it can even be published in a
newspaper), allowing anyone to encrypt with the key, whereas only the proper
recipient (who knows the decryption key) can decrypt the message. The encryption
key is also called the public key and the decryption key the private key or secret
key.
1111101010110000001101000101110011110000001100001001110011110110100111100011101001010010110111101011111010010000011100000101110000110110001111101101101010110010100111100111011001110000000110001011110011010100100111001001100001010010011111100001011010111110111110101011000000110100010111001111000000110000100111001111011010011110001110100101001011011110101111101001000001110000010111000011011000111110
1101101010110010100111100111011001110000000110001011110011010100100111001001100001010010011111100001011010111110111110101011000000110100010111001111000000110000100111001111011010011110001110100101001011011110101111101001000001110000010111000011011000111110110110101011001010011110011101100111000000011000101111001101010010011100100110000101001001111110000101101011111011111010101100000011010001011100
1111000000110000100111001111011010011110001110100101001011011110101111101001000001110000010111000011011000111110110110101011001010011110011101100111000000011000101111001101010010011100100110000101001001111110000101101011111011111010101100000011010001011100111100000011000010011100111101101001111000111010010100101101111010111110100100000111000001011100001101100011111011011010101100101001111001110110
0111000000011000101111001101010010011100100110000101001001111110000101101011111011111010101100000011010001011100111100000011000010011100111101101001111000111010010100101101111010111110100100000111000001011100001101100011111011011010101100101001111001110110011100000001100010111100110101001001110010011000010100100111111000010110101111101111101010110000001101000101110011110000001100001001110011110110
1001111000111010010100101101111010111110100100000111000001011100001101100011111011011010101100101001111001110110011100000001100010111100110101001001110010011000010100100111111000010110101111101111101010110000001101000101110011110000001100001001110011110110100111100011101001010010110111101011111010010000011100000101110000110110001111101101101010110010100111100111011001110000000110001011110011010100
1001110010011000010100100111111000010110101111101111101010110000001101000101110011110000001100001001110011110110100111100011101001010010110111101011111010010000011100000101110000110110001111101101101010110010100111100111011001110000000110001011110011010100100111001001100001010010011111100001011010111110111110101011000000110100010111001111000000110000100111001111011010011110001110100101001011011110
1011111010010000011100000101110000110110001111101101101010110010100111100111011001110000000110001011110011010100100111001001100001010010011111100001011010111110111110101011000000110100010111001111000000110000100111001111011010011110001110100101001011011110101111101001000001110000010111000011011000111110110110101011001010011110011101100111000000011000101111001101010010011100100110000101001001111110
0010010100001101011000011010010110101101001001001100101100101011000001110100110110111101100000010010010101001101000001111010101101000011101001111000111100101111011000010000100110101101110001011110110100010001000001110110111100000111100000111100101111000111001001010000110101100001101001011010110100100100110010110010101100000111010011011011110110000001001001010100110100000111101010110100001110100111
1000111100101111011000010000100110101101110001011110110100010001000001110110111100000111100000111100101111000111001001010000110101100001101001011010110100100100110010110010101100000111010011011011110110000001001001010100110100000111101010110100001110100111100011110010111101100001000010011010110111000101111011010001000100000111011011110000011110000011110010111100011100100101000011010110000110100101
1010110100100100110010110010101100000111010011011011110110000001001001010100110100000111101010110100001110100111100011110010111101100001000010011010110111000101111011010001000100000111011011110000011110000011110010111100011100100101000011010110000110100101101011010010010011001011001010110000011101001101101111011000000100100101010011010000011110101011010000111010011110001111001011110110000100001001
Conclusion
Dramatic advances in factoring large integers would make RSA vulnerable, but other
attacks against specific variants are also known. Good
implementations use redundancy (or padding with specific structure) in order to
avoid attacks using the multiplicative structure of the cipher text. RSA is vulnerable
to chosen plain text attacks and hardware and fault attacks. Also important attacks
against very small exponents exist, as well as against partially revealed factorization
of the modulus.
The plain RSA algorithm should not be used in any application. It is recommended
that implementations follow the standard as this has also the additional benefit of
inter-operability with most major protocols.
RSA is currently the most important public key algorithm. It was patented in the
United States (the patent expired in the year 2000).