Implementation of the RSA Public - Key Cryptosystem
نویسنده
چکیده
The history of secret messages, cryptosystems, codes and codecracking is as old as the history of man. In this article, we will deal with the cryptosystem proposed by Rivest, Shamir and Adleman in 1977, see [3]. It has two characteristics which distinguish it from most other encryption methods: The usage of Number Theory and the fact that the process of deciphering is not just opposite to the one of enciphering. As a consequence of the latter feature, the enciphering key is made public, giving the system the attribute "Public-Key". Two applications of this feature will be discussed later, namely a multiuser operation option and an option for authorizing a message by giving a signature. In section 2, we will provide the background from elementary Number Theory, as far as needed for the following. In section 3, we will describe the RSA cryptosystem. A numerical example will be given in section 4. Section 5 contains a discussion about the safety of the system, section 6 describes the extension of the system to multiuser operation. Finally, in section 7, two computer programs are presented. The reader will notice that the problems of finding large prime numbers and factorizing large numbers are closely connected with the concept of the RSA cryptosystem. Roughly speaking, the party that wants to transmit a secret message has to find two large prime numbers and use them in the enciphering and deciphering process, whereas the enemy who wants to crack the code of the message has to find the factorization of the product of these two primes. Up to the present day, it is very hard to find large prime numbers. But it is still much harder to factorize large numbers. Hence, the transmitters of the secret message have an advantage
منابع مشابه
QTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملOn the Efficiency of Fast RSA Variants in Modern Mobile Phones
Modern mobile phones are increasingly being used for more services that require modern security mechanisms such as the public-key cryptosystem RSA. It is, however, well-known that public-key cryptography demands considerable computing resources and that RSA encryption is much faster than RSA decryption. It is consequently an interesting question if RSA as a whole can be executed efficiently on ...
متن کاملEfficient Implementation of Public Key Cryptosystems on MICAz and TelosB Motes
Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can fulfill many security requirements, public-key cryptography is more flexible and simple rendering a clean interface for the security component. Against the popular belief that public key scheme is not practical for sensor networks, this technical report describes the RSA and ECC public-key cryptos...
متن کاملNICE - New Ideal Coset Encryption
Recently, a new public-key cryptosystem constructed on number elds is presented. The prominent theoretical property of the public-key cryptosystem is a quadratic decryption bit complexity of the public key, which consists of only simple fast arithmetical operations. We call the cryptosystem NICE (New Ideal Coset Encryption). In this paper, we consider practical aspects of the NICE cryptosystem....
متن کاملA Study and Implementation of RSA Cryptosystem
This project involves an implementation of the Rivest Shamir Adleman (RSA)[1] encryption algorithm in C. It consists of generation of two random prime numbers and a number coprime to φ(n) also called euler toitent function. These three are used to generate a public key and private key. The user has to enter a message which is encrypted by the public key. The algorithm also decrypts the generate...
متن کاملFPGA Implementation of Modified Montgomery for RSA Cryptosystem
Modular multiplication is a key operation in public key cryptosystems like RSA. Among modular multiplication methods, Montgomery modular multiplication is an efficient algorithm suitable for hardware implementation. In this paper, a Modified Montgomery Modular Multiplication design is proposed with carry save adder architecture and parallel simplified quotient computation for the next iteration...
متن کامل