Introduction to the RSA algorithm and modular arithmetic
نویسنده
چکیده
These notes are an introduction to the RSA algorithm, and to the mathematics needed to understand it. The RSA algorithm — the name comes from the initials of its inventors, Rivest, Shamir, and Adleman — is the foundation of modern public key cryptography. It is used for electronic commerce and many other types of secure communication over the Internet. The RSA algorithm is based on a type of mathematics known as modular arithmetic. Modular arithmetic is an interesting variation of ordinary arithmetic, but whereas everyday arithmetic is familiar to school children everywhere, modular arithmetic is a somewhat obscure subject. It’s not that modular arithmetic is particularly difficult, or confusing; one could teach it in high school, or even earlier. Conventional thinking, however, places a higher value on the ability to balance a checkbook than on the ability to communicate in code; this is probably the reason why most people have never heard of modular arithmetic. Today, the rapid proliferation of the Internet and the growing popularity of electronic financial transactions are causing a shift in attitudes. These days, even an introductory understanding of public key cryptography can be enormously useful. Consequently, today’s students deserve an opportunity to become acquainted with the methods and ideas of modular arithmetic. First, a quick word about these notes. I have tried to make the material here as down to earth, and accessible as possible. As such, the emphasis is on concrete calculations, rather than abstruse theory. My goal is to guide you through the concrete steps needed to implement and understand RSA
منابع مشابه
Course 2BA1, 2008–09 Section 8: Introduction to Number Theory and Cryptography
8 Introduction to Number Theory and Cryptography 125 8.1 Subgroups of the Integers . . . . . . . . . . . . . . . . . . . . 125 8.2 Greatest Common Divisors . . . . . . . . . . . . . . . . . . . . 125 8.3 The Euclidean Algorithm . . . . . . . . . . . . . . . . . . . . . 126 8.4 Prime Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . 129 8.5 The Fundamental Theorem of Arithmetic . . . ....
متن کاملCourse Ma2c03, Hilary Term 2014 Section 9: Introduction to Number Theory and Cryptography
9 Introduction to Number Theory 168 9.1 Subgroups of the Integers . . . . . . . . . . . . . . . . . . . . 168 9.2 Greatest Common Divisors . . . . . . . . . . . . . . . . . . . . 168 9.3 The Euclidean Algorithm . . . . . . . . . . . . . . . . . . . . . 169 9.4 Prime Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . 172 9.5 The Fundamental Theorem of Arithmetic . . . . . . . . . . . . ...
متن کاملA Hardware Organization of High-Radix Modular Multiplication for RSA Cryptosystem
Hardware organized modular multiplication based on division algorithm is one of the effective methods used for RSA encryption/decryption. This paper generalizes the hardware organization of the modular multiplication based on the higher-radix SRT division algorithm, and describes the area/time trade-off of the organization. For the number representation we used the signed-digit number system an...
متن کاملComputational Complexity Analyses of Modular Arithmetic for RSA Cryptosystem
Modular arithmetic is fundamental to several public-key cryptography systems such as the RSA encryption system, as well as the most dominant part of the computation performed. The operation is time-consuming for large operands. Many relevant papers about computer security are issued in many reports and journals to describe how to reduce the computational complexities in the cryptosystems. In th...
متن کاملEfficient and Side-channel Resistant RSA Implementation For 8-bit AVR Microcontrollers
The RSA algorithm is the most widely used publickey cryptosystem today, but difficult to implement on embedded devices due to the computation-intense nature of its underlying arithmetic operations. Different techniques for efficient software implementation of the RSA algorithm have been proposed; these range from high-level approaches, such as exploiting the Chinese Remainder Theorem (CRT), dow...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره cs.CR/9903001 شماره
صفحات -
تاریخ انتشار 1999