wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

RSA (Rivest-Shamir-Adelman) Algorithm

profile
Jermin Shaikh
Apr 27, 2023
0 Likes
0 Discussions
134 Reads

When using RSA for encryption and decryption of general data, it reverses the key set usage. Unlike signature verification, it uses the receiver’s public key to encrypt the data, and it uses the receiver’s private key in decrypting the data. Thus, there is no need to exchange any keys in this scenario.

 

There are two broad components when it comes to RSA cryptography, they are: 

  • Key Generation: Generating the keys to be used for encrypting and decrypting the data to be exchanged.
  • Encryption/Decryption Function: The steps that need to be run when scrambling and recovering the data.

 

You need to generate public and private keys before running the functions to generate your ciphertext and plaintext. They use certain variables and parameters, all of which are explained below:

  • Choose two large prime numbers (p and q)
  • Calculate n = p*q and z = (p-1)(q-1)
  • Choose a number e where 1 < e < z
  • Calculate d = e-1mod(p-1)(q-1)
  • You can bundle private key pair as (n,d)
  • You can bundle public key pair as (n,e)

adv-RSA_Algorithm.

  • No Key Sharing: RSA encryption depends on using the receiver’s public key, so you don’t have to share any secret key to receive messages from others.
  • Proof of Authenticity: Since the key pairs are related to each other, a receiver can’t intercept the message since they won’t have the correct private key to decrypt the information.
  • Faster Encryption: The encryption process is faster than that of the DSA algorithm.
  • Data Can’t Be Modified: Data will be tamper-proof in transit since meddling with the data will alter the usage of the keys. And the private key won’t be able to decrypt the information, hence alerting the receiver of manipulation.

Comments ()


Sign in

Read Next

Mumbai

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

From Model Mistakes to Metrics

Blog banner

Disk Management

Blog banner

Software

Blog banner

Why is online marketing is important in current scenario

Blog banner

Google

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

Concept and definition of m-commerce

Blog banner

NIKE

Blog banner

Deadlock and starvation

Blog banner

TEAMWORK

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Capacity management in ITSM

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

Way to make your meal healthier.

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

BUFFER OVERFLOW_142

Blog banner

Basic Security For SOAP Services

Blog banner

Network Forensics Tools and Techniques

Blog banner

Cross site scripting Attack

Blog banner

Jira Software

Blog banner

Uniprocessor and Types

Blog banner

Virtual Machine

Blog banner

Life of a 2020-2021 student

Blog banner

Supervised and Unsupervised Learning

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Threads

Blog banner

THE DESIRE OF MANY

Blog banner

Deadlock

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

What are NFT s?

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Data Lake

Blog banner

DBMS and various career options related to it.

Blog banner

GIS in Disaster Management

Blog banner

Dr. Venkadavarahan

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

DIGITAL TECHNOLOGY

Blog banner

MENDELEY

Blog banner