ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Computers and Networks Security: RSA Algorithm and Caesar Cipher

Verified

Added on  2023/04/22

|4
|502
|499
AI Summary
This document discusses the RSA algorithm and Caesar Cipher in Computers and Networks Security. It explains how RSA algorithm offers maximum integrity, confidentiality and authenticity towards the information shared. The document also provides an overview of Caesar Cipher, which is one of the oldest techniques used for encryption.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: COMPUTERS AND NETWORKS SECURITY
COMPUTERS AND NETWORKS SECURITY
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1COMPUTERS AND NETWORKS SECURITY
About RSA algorithm
RSA algorithm stands for Rivest Shamir Adleman that is completely based on cryptosystem.
RSA algorithm is used for performing encryption. This was first introduced in the year 1977 with the
aim of providing cryptosystem towards the system. The scientist developed this algorithm are
Leonard Adleman, Adi Shamir and Ron Rivest.this algorithm is the developed version of
public key algorithm that was earlier introduced by British mathematician Clifford Cocks in
the early year of 1973 (Gohel, 2015). RSA algorithm offers an effective and reliable way for
encryption. There are two keys used for performing encryption and decryption. The public
key is used at the time of encryption. Once the message is encrypted and delivered to the
desired person the private key is shared and is further used for decrypting the message. One
of the most important techniques performed with the use of RSA algorithm is the signature
verification among the networks. Due to the activities involved in RSA algorithm this is also
known as asymmetric algorithm (Steef, Shamma & Alkhatib, 2016). The main advantage of
using RSA algorithm is that it offers maximum integrity, confidentiality and authenticity
towards the information shared. Apart from this RSA algorithms are also used for performing
software based programs to secure the connection over the internet. Digital signature
validation can be performed with the use of RSA algorithm.
Caesar Cypher
Caesar Cipher is one of the easiest way of performing encryption. In this each letter is
replaced by some other fixed text. This is the oldest technique used for encryption (Allen,
2017). The algorithm used behind the Caesar cipher is:
En(x) = (x+n) mod 26 (the result rranges from 0 to 25 and x+n does not ranges from 0 to 25)
For example the transformation of the plain text is done here by using left rotation of
their places and this is equivalent to right shift of 23
Document Page
2COMPUTERS AND NETWORKS SECURITY
Plain: XYZABCDEFGHIJKL
Cipher: JKLXYZABCDEFGHI
Document Page
3COMPUTERS AND NETWORKS SECURITY
References
Allen, G. D. (2017). The Caesar Cypher. In Pedagogy and Content in Middle and High School
Mathematics (pp. 11-12). SensePublishers, Rotterdam.
Gohel, H. (2015). Design and development of combined algorithm computing technique to enhance
web security. International Journal of Innovative and Emerging Research in Engineering
(IJIERE), 2(1), 76-79.
Steef, A., Shamma, M. N., & Alkhatib, A. (2016). RSA algorithm with a new approach encryption
and decryption message text by ascii. arXiv preprint arXiv:1610.08832.
1 out of 4
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]