wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

RSA (Rivest-Shamir-Adelman) Algorithm

profile
Jermin Shaikh
Apr 27, 2023
0 Likes
0 Discussions
134 Reads

When using RSA for encryption and decryption of general data, it reverses the key set usage. Unlike signature verification, it uses the receiver’s public key to encrypt the data, and it uses the receiver’s private key in decrypting the data. Thus, there is no need to exchange any keys in this scenario.

 

There are two broad components when it comes to RSA cryptography, they are: 

  • Key Generation: Generating the keys to be used for encrypting and decrypting the data to be exchanged.
  • Encryption/Decryption Function: The steps that need to be run when scrambling and recovering the data.

 

You need to generate public and private keys before running the functions to generate your ciphertext and plaintext. They use certain variables and parameters, all of which are explained below:

  • Choose two large prime numbers (p and q)
  • Calculate n = p*q and z = (p-1)(q-1)
  • Choose a number e where 1 < e < z
  • Calculate d = e-1mod(p-1)(q-1)
  • You can bundle private key pair as (n,d)
  • You can bundle public key pair as (n,e)

adv-RSA_Algorithm.

  • No Key Sharing: RSA encryption depends on using the receiver’s public key, so you don’t have to share any secret key to receive messages from others.
  • Proof of Authenticity: Since the key pairs are related to each other, a receiver can’t intercept the message since they won’t have the correct private key to decrypt the information.
  • Faster Encryption: The encryption process is faster than that of the DSA algorithm.
  • Data Can’t Be Modified: Data will be tamper-proof in transit since meddling with the data will alter the usage of the keys. And the private key won’t be able to decrypt the information, hence alerting the receiver of manipulation.

Comments ()


Sign in

Read Next

E-commerce

Blog banner

Texting is actually better than talking in person

Blog banner

RAID

Blog banner

OS Evolution Achievements

Blog banner

Video games

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Optimization of operating system design

Blog banner

Importance of Network Security Risk

Blog banner

File management

Blog banner

VIRTUAL MACHINE

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

Confidence Building Activities for the New School Year

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Direct Memory Access

Blog banner

Twisted world

Blog banner

RAID

Blog banner

Virtual Machine

Blog banner

What if COVID does not exist!

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

virtual machine

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

My Favorite Country

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

Health and fitness

Blog banner

BharatPe

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

The Laws of Karma

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Stop Racism

Blog banner

Women empowerment

Blog banner

USES OF WHATSAPP

Blog banner

ProofHub

Blog banner

City of Mumbai (Bombay):

Blog banner

Puri Jagannath temple

Blog banner

Types of Threads

Blog banner

Microsoft powerpoint presentation

Blog banner

WINDOWS I/ O

Blog banner

IOT Hacking Techniques

Blog banner

Tiranga - Abbas Haveliwala

Blog banner