wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

RSA (Rivest-Shamir-Adelman) Algorithm

profile
Jermin Shaikh
Apr 27, 2023
0 Likes
0 Discussions
134 Reads

When using RSA for encryption and decryption of general data, it reverses the key set usage. Unlike signature verification, it uses the receiver’s public key to encrypt the data, and it uses the receiver’s private key in decrypting the data. Thus, there is no need to exchange any keys in this scenario.

 

There are two broad components when it comes to RSA cryptography, they are: 

  • Key Generation: Generating the keys to be used for encrypting and decrypting the data to be exchanged.
  • Encryption/Decryption Function: The steps that need to be run when scrambling and recovering the data.

 

You need to generate public and private keys before running the functions to generate your ciphertext and plaintext. They use certain variables and parameters, all of which are explained below:

  • Choose two large prime numbers (p and q)
  • Calculate n = p*q and z = (p-1)(q-1)
  • Choose a number e where 1 < e < z
  • Calculate d = e-1mod(p-1)(q-1)
  • You can bundle private key pair as (n,d)
  • You can bundle public key pair as (n,e)

adv-RSA_Algorithm.

  • No Key Sharing: RSA encryption depends on using the receiver’s public key, so you don’t have to share any secret key to receive messages from others.
  • Proof of Authenticity: Since the key pairs are related to each other, a receiver can’t intercept the message since they won’t have the correct private key to decrypt the information.
  • Faster Encryption: The encryption process is faster than that of the DSA algorithm.
  • Data Can’t Be Modified: Data will be tamper-proof in transit since meddling with the data will alter the usage of the keys. And the private key won’t be able to decrypt the information, hence alerting the receiver of manipulation.

Comments ()


Sign in

Read Next

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

10 Unknown facts about India's Independence

Blog banner

Never give up

Blog banner

How I use google in my daily life

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

Life of an army person

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

NETWORK SECURITY RISKS

Blog banner

DATA WRANGLING

Blog banner

Virtual Memory

Blog banner

LinkedIn

Blog banner

Memory Management - operating system

Blog banner

A Journey By Train

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

APACHE KAFKA

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Linux -V Server Virtual Machine

Blog banner

Remote Work in 2026

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Friendship

Blog banner

Atlantis - The Lost Island.........

Blog banner

Deadlock and Starvation

Blog banner

My Favorite Country

Blog banner

Proton mail

Blog banner

FREE VERSION OF G-MAIL

Blog banner

Threads and concurrency

Blog banner

Data Warehousing

Blog banner

How to Run your First android App

Blog banner

Supervised and Unsupervised Learning

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Virtual memory

Blog banner

Pooja Silver

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

Fashion marketing in india

Blog banner

Cyber Forensics on IOT Devices

Blog banner

Dr. Venkadavarahan

Blog banner

Threads

Blog banner

Evolution of the Microprocesor

Blog banner

What Is Experiential Learning and Why Does It Work Better Than Rote Learning?

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

Deadlocks

Blog banner

Blockchain in IoT Applications

Blog banner