Cryptography and Key Generation using RSA Algorithm

   

Added on  2023-06-05

4 Pages766 Words307 Views
Running head: INFORMATION TECHNOLOGY
Information Technology
Name of the student
Name of the University
Author’s note
Cryptography and Key Generation using RSA Algorithm_1
1
Mobile Systems
Introduction
These report is professional representation of the solutions done on the assignment given on
Creating Key from the Student ID and Breaking the same keys. It also aimed at providing an
insight on how Cryptography works and How Keys are generated using cryptography. This report
will provide an overview of Encryption and Public –Key Cryptosystems.
Below, Is an introductions to the common words to make us aware of the process that I undertake.
Encryption as a term refers to a method of converting plain text into a cipher text message and
decryption is the of converting the cipher text message into plaintext.
Key is a parameter used in the process of encryption and Decryption of message.
The Algorithm used to Generate keys was RSA Algorithm. The Security of RSA relies mostly on
Complex computational difficulty of using and factoring large integers called prime numbers for
example The Student ID. The ability to factor large and larger prime numbers increases the
encryption power. Encryption strength is directly tied to key size and length of the exponential.
Linkage Between Creating Keys and Breaking Keys
In order to encrypt any message, you must create a private key and public key to be use. The
relationship between creating the key and breaking the key is an important part of securing
message content from eavesdropping.
In both of the part 1 and 2 is that, A public key is used for encryption and private key is used for
decrypting.
primes of the type 4x+1 are weaker than primes of type 4x+3 because one of its digit changes
when the other single digit is changed. Primes of this Form is smaller than the average of the two
primes surrounding primes
Cryptography and Key Generation using RSA Algorithm_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Symmetric Encryption Assignment
|5
|884
|175

Encryption Algorithm Assignment
|6
|1103
|186

Paper | Implementation Design for Data Encryption & Decryption
|7
|2263
|227

Security in Information Technology | Assignments
|13
|3545
|119

Three Data Encryption Standards for WIMAX Networks Part 1: Wireless Networks
|14
|1565
|42

Principle and Method in Cryptographic Security | Discussion
|4
|638
|19