wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

RSA (Rivest-Shamir-Adelman) Algorithm

profile
Jermin Shaikh
Apr 27, 2023
0 Likes
0 Discussions
134 Reads

When using RSA for encryption and decryption of general data, it reverses the key set usage. Unlike signature verification, it uses the receiver’s public key to encrypt the data, and it uses the receiver’s private key in decrypting the data. Thus, there is no need to exchange any keys in this scenario.

 

There are two broad components when it comes to RSA cryptography, they are: 

  • Key Generation: Generating the keys to be used for encrypting and decrypting the data to be exchanged.
  • Encryption/Decryption Function: The steps that need to be run when scrambling and recovering the data.

 

You need to generate public and private keys before running the functions to generate your ciphertext and plaintext. They use certain variables and parameters, all of which are explained below:

  • Choose two large prime numbers (p and q)
  • Calculate n = p*q and z = (p-1)(q-1)
  • Choose a number e where 1 < e < z
  • Calculate d = e-1mod(p-1)(q-1)
  • You can bundle private key pair as (n,d)
  • You can bundle public key pair as (n,e)

adv-RSA_Algorithm.

  • No Key Sharing: RSA encryption depends on using the receiver’s public key, so you don’t have to share any secret key to receive messages from others.
  • Proof of Authenticity: Since the key pairs are related to each other, a receiver can’t intercept the message since they won’t have the correct private key to decrypt the information.
  • Faster Encryption: The encryption process is faster than that of the DSA algorithm.
  • Data Can’t Be Modified: Data will be tamper-proof in transit since meddling with the data will alter the usage of the keys. And the private key won’t be able to decrypt the information, hence alerting the receiver of manipulation.

Comments ()


Sign in

Read Next

Smitten Kitchen Keepers

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

Hacking of web server and application

Blog banner

Fashion design

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Introduction my self

Blog banner

Phishing

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Deadlock

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

Be you

Blog banner

Modern Operating System

Blog banner

Operating System Objectives and Functions

Blog banner

GIS

Blog banner

Lifestyle of a photographer

Blog banner

Way to make your meal healthier.

Blog banner

Web Site

Blog banner

The seven-step improvement process

Blog banner

Device driver

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

What is Vishing?

Blog banner

Cyber Security in Data Breaching

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Deadlock and Starvation

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

HTML vs HTML5

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

R Programming

Blog banner

Can ChatGPT Answer All My Questions About Life?

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

Virtual Machine

Blog banner

What is HTML?

Blog banner

Virtual memory in Operating System

Blog banner

Optimization of operating system design

Blog banner

CoWIN

Blog banner

MailChimp

Blog banner