wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

RSA (Rivest-Shamir-Adelman) Algorithm

profile
Jermin Shaikh
Apr 27, 2023
0 Likes
0 Discussions
134 Reads

When using RSA for encryption and decryption of general data, it reverses the key set usage. Unlike signature verification, it uses the receiver’s public key to encrypt the data, and it uses the receiver’s private key in decrypting the data. Thus, there is no need to exchange any keys in this scenario.

 

There are two broad components when it comes to RSA cryptography, they are: 

  • Key Generation: Generating the keys to be used for encrypting and decrypting the data to be exchanged.
  • Encryption/Decryption Function: The steps that need to be run when scrambling and recovering the data.

 

You need to generate public and private keys before running the functions to generate your ciphertext and plaintext. They use certain variables and parameters, all of which are explained below:

  • Choose two large prime numbers (p and q)
  • Calculate n = p*q and z = (p-1)(q-1)
  • Choose a number e where 1 < e < z
  • Calculate d = e-1mod(p-1)(q-1)
  • You can bundle private key pair as (n,d)
  • You can bundle public key pair as (n,e)

adv-RSA_Algorithm.

  • No Key Sharing: RSA encryption depends on using the receiver’s public key, so you don’t have to share any secret key to receive messages from others.
  • Proof of Authenticity: Since the key pairs are related to each other, a receiver can’t intercept the message since they won’t have the correct private key to decrypt the information.
  • Faster Encryption: The encryption process is faster than that of the DSA algorithm.
  • Data Can’t Be Modified: Data will be tamper-proof in transit since meddling with the data will alter the usage of the keys. And the private key won’t be able to decrypt the information, hence alerting the receiver of manipulation.

Comments ()


Sign in

Read Next

IT service level agreement

Blog banner

Blockchain technology: security risk and prevention

Blog banner

Memory management

Blog banner

objectives and functions of operating system

Blog banner

Threads in OS

Blog banner

Memory Management

Blog banner

You Get Everyone, But No One Gets You: The Lonely Side of High Emotional Intelligence

Blog banner

Deadlock and starvation in operating system

Blog banner

I/O Management and Disk Scheduling

Blog banner

Evolution of Operating Systems

Blog banner

Article on Fresh Book

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

Starvation and Deadlock.

Blog banner

Paid Email

Blog banner

Access management

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Virtual Memory

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

1.1 basic elements

Blog banner

Smartsheet

Blog banner

File management

Blog banner

Software

Blog banner

Concurrency and memory

Blog banner

MODERN OPERATING SYSTEM

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

Paging

Blog banner

Semaphores

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

How social media affect

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

File management in os

Blog banner

UniProcessor Scheduling

Blog banner

Data carving - using hex editor

Blog banner

Key to success in Sports

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

Strengthening Active Directory Security

Blog banner

Docker Framework

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

Deadlock

Blog banner