Analysis of RSA Algorithm and Caesar Cipher in Computer Networks
VerifiedAdded on 2023/04/22
|4
|502
|499
Report
AI Summary
This report delves into the realm of encryption techniques, focusing on two prominent methods: the RSA algorithm and the Caesar cipher. The report begins by introducing the RSA algorithm, a public-key cryptosystem widely used for secure data transmission. It explains the underlying principles of RS...

Running head: COMPUTERS AND NETWORKS SECURITY
COMPUTERS AND NETWORKS SECURITY
Name of the Student
Name of the University
Author Note
COMPUTERS AND NETWORKS SECURITY
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1COMPUTERS AND NETWORKS SECURITY
About RSA algorithm
RSA algorithm stands for Rivest Shamir Adleman that is completely based on cryptosystem.
RSA algorithm is used for performing encryption. This was first introduced in the year 1977 with the
aim of providing cryptosystem towards the system. The scientist developed this algorithm are
Leonard Adleman, Adi Shamir and Ron Rivest.this algorithm is the developed version of
public key algorithm that was earlier introduced by British mathematician Clifford Cocks in
the early year of 1973 (Gohel, 2015). RSA algorithm offers an effective and reliable way for
encryption. There are two keys used for performing encryption and decryption. The public
key is used at the time of encryption. Once the message is encrypted and delivered to the
desired person the private key is shared and is further used for decrypting the message. One
of the most important techniques performed with the use of RSA algorithm is the signature
verification among the networks. Due to the activities involved in RSA algorithm this is also
known as asymmetric algorithm (Steef, Shamma & Alkhatib, 2016). The main advantage of
using RSA algorithm is that it offers maximum integrity, confidentiality and authenticity
towards the information shared. Apart from this RSA algorithms are also used for performing
software based programs to secure the connection over the internet. Digital signature
validation can be performed with the use of RSA algorithm.
Caesar Cypher
Caesar Cipher is one of the easiest way of performing encryption. In this each letter is
replaced by some other fixed text. This is the oldest technique used for encryption (Allen,
2017). The algorithm used behind the Caesar cipher is:
En(x) = (x+n) mod 26 (the result rranges from 0 to 25 and x+n does not ranges from 0 to 25)
For example the transformation of the plain text is done here by using left rotation of
their places and this is equivalent to right shift of 23
About RSA algorithm
RSA algorithm stands for Rivest Shamir Adleman that is completely based on cryptosystem.
RSA algorithm is used for performing encryption. This was first introduced in the year 1977 with the
aim of providing cryptosystem towards the system. The scientist developed this algorithm are
Leonard Adleman, Adi Shamir and Ron Rivest.this algorithm is the developed version of
public key algorithm that was earlier introduced by British mathematician Clifford Cocks in
the early year of 1973 (Gohel, 2015). RSA algorithm offers an effective and reliable way for
encryption. There are two keys used for performing encryption and decryption. The public
key is used at the time of encryption. Once the message is encrypted and delivered to the
desired person the private key is shared and is further used for decrypting the message. One
of the most important techniques performed with the use of RSA algorithm is the signature
verification among the networks. Due to the activities involved in RSA algorithm this is also
known as asymmetric algorithm (Steef, Shamma & Alkhatib, 2016). The main advantage of
using RSA algorithm is that it offers maximum integrity, confidentiality and authenticity
towards the information shared. Apart from this RSA algorithms are also used for performing
software based programs to secure the connection over the internet. Digital signature
validation can be performed with the use of RSA algorithm.
Caesar Cypher
Caesar Cipher is one of the easiest way of performing encryption. In this each letter is
replaced by some other fixed text. This is the oldest technique used for encryption (Allen,
2017). The algorithm used behind the Caesar cipher is:
En(x) = (x+n) mod 26 (the result rranges from 0 to 25 and x+n does not ranges from 0 to 25)
For example the transformation of the plain text is done here by using left rotation of
their places and this is equivalent to right shift of 23

2COMPUTERS AND NETWORKS SECURITY
Plain: XYZABCDEFGHIJKL
Cipher: JKLXYZABCDEFGHI
Plain: XYZABCDEFGHIJKL
Cipher: JKLXYZABCDEFGHI
You're viewing a preview
Unlock full access by subscribing today!

3COMPUTERS AND NETWORKS SECURITY
References
Allen, G. D. (2017). The Caesar Cypher. In Pedagogy and Content in Middle and High School
Mathematics (pp. 11-12). SensePublishers, Rotterdam.
Gohel, H. (2015). Design and development of combined algorithm computing technique to enhance
web security. International Journal of Innovative and Emerging Research in Engineering
(IJIERE), 2(1), 76-79.
Steef, A., Shamma, M. N., & Alkhatib, A. (2016). RSA algorithm with a new approach encryption
and decryption message text by ascii. arXiv preprint arXiv:1610.08832.
References
Allen, G. D. (2017). The Caesar Cypher. In Pedagogy and Content in Middle and High School
Mathematics (pp. 11-12). SensePublishers, Rotterdam.
Gohel, H. (2015). Design and development of combined algorithm computing technique to enhance
web security. International Journal of Innovative and Emerging Research in Engineering
(IJIERE), 2(1), 76-79.
Steef, A., Shamma, M. N., & Alkhatib, A. (2016). RSA algorithm with a new approach encryption
and decryption message text by ascii. arXiv preprint arXiv:1610.08832.
1 out of 4
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.