wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

RSA (Rivest-Shamir-Adelman) Algorithm

profile
Jermin Shaikh
Apr 27, 2023
0 Likes
0 Discussions
134 Reads

When using RSA for encryption and decryption of general data, it reverses the key set usage. Unlike signature verification, it uses the receiver’s public key to encrypt the data, and it uses the receiver’s private key in decrypting the data. Thus, there is no need to exchange any keys in this scenario.

 

There are two broad components when it comes to RSA cryptography, they are: 

  • Key Generation: Generating the keys to be used for encrypting and decrypting the data to be exchanged.
  • Encryption/Decryption Function: The steps that need to be run when scrambling and recovering the data.

 

You need to generate public and private keys before running the functions to generate your ciphertext and plaintext. They use certain variables and parameters, all of which are explained below:

  • Choose two large prime numbers (p and q)
  • Calculate n = p*q and z = (p-1)(q-1)
  • Choose a number e where 1 < e < z
  • Calculate d = e-1mod(p-1)(q-1)
  • You can bundle private key pair as (n,d)
  • You can bundle public key pair as (n,e)

adv-RSA_Algorithm.

  • No Key Sharing: RSA encryption depends on using the receiver’s public key, so you don’t have to share any secret key to receive messages from others.
  • Proof of Authenticity: Since the key pairs are related to each other, a receiver can’t intercept the message since they won’t have the correct private key to decrypt the information.
  • Faster Encryption: The encryption process is faster than that of the DSA algorithm.
  • Data Can’t Be Modified: Data will be tamper-proof in transit since meddling with the data will alter the usage of the keys. And the private key won’t be able to decrypt the information, hence alerting the receiver of manipulation.

Comments ()


Sign in

Read Next

Direct memory access (DMA)

Blog banner

Why is online marketing is important in current scenario

Blog banner

Operating system

Blog banner

My First Dream Bike

Blog banner

THE ACTORS LIFE

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

Cache memory

Blog banner

Indian Culture and Tradition

Blog banner

Modern operating system

Blog banner

Compromising Mobile Platforms

Blog banner

Getting into anime My anime suggestions

Blog banner

I Personally

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

Routers

Blog banner

Starvation

Blog banner

Beatbox

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

ONLINE NEWSROOMS

Blog banner

Man VS Nature

Blog banner

Caching windows

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

I/O Management and Disk Scheduling

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Memory management

Blog banner

virtual memory

Blog banner

HACKING MOBILE PLATFORM

Blog banner

Traditional Unix System

Blog banner

BITCOIN WALLET

Blog banner

Android Flashlight Application

Blog banner

Deadlock in Operating systems

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

GIS

Blog banner

IT Service as as Value Creation

Blog banner

What is HTML?

Blog banner

Virtual Memory

Blog banner

BIRYANI ! The history you never knew about

Blog banner

Process states

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

?How long does wisdom tooth pain last?

Blog banner