logo

Computers and Networks Security: RSA Algorithm and Caesar Cipher

   

Added on  2023-04-22

4 Pages502 Words499 Views
Running head: COMPUTERS AND NETWORKS SECURITY
COMPUTERS AND NETWORKS SECURITY
Name of the Student
Name of the University
Author Note

1COMPUTERS AND NETWORKS SECURITY
About RSA algorithm
RSA algorithm stands for Rivest Shamir Adleman that is completely based on cryptosystem.
RSA algorithm is used for performing encryption. This was first introduced in the year 1977 with the
aim of providing cryptosystem towards the system. The scientist developed this algorithm are
Leonard Adleman, Adi Shamir and Ron Rivest.this algorithm is the developed version of
public key algorithm that was earlier introduced by British mathematician Clifford Cocks in
the early year of 1973 (Gohel, 2015). RSA algorithm offers an effective and reliable way for
encryption. There are two keys used for performing encryption and decryption. The public
key is used at the time of encryption. Once the message is encrypted and delivered to the
desired person the private key is shared and is further used for decrypting the message. One
of the most important techniques performed with the use of RSA algorithm is the signature
verification among the networks. Due to the activities involved in RSA algorithm this is also
known as asymmetric algorithm (Steef, Shamma & Alkhatib, 2016). The main advantage of
using RSA algorithm is that it offers maximum integrity, confidentiality and authenticity
towards the information shared. Apart from this RSA algorithms are also used for performing
software based programs to secure the connection over the internet. Digital signature
validation can be performed with the use of RSA algorithm.
Caesar Cypher
Caesar Cipher is one of the easiest way of performing encryption. In this each letter is
replaced by some other fixed text. This is the oldest technique used for encryption (Allen,
2017). The algorithm used behind the Caesar cipher is:
En(x) = (x+n) mod 26 (the result rranges from 0 to 25 and x+n does not ranges from 0 to 25)
For example the transformation of the plain text is done here by using left rotation of
their places and this is equivalent to right shift of 23

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
RSA ALGORITHM Name of the University Author Note RSA ALGORITHM Name of the Student Name of the University Author Note RSA ALGORITHM RSA ALGORITHM Name of the Author of the University
|3
|472
|239

Three Data Encryption Standards for WIMAX Networks Part 1: Wireless Networks
|14
|1565
|42

Security in Computing and IT in PDF
|13
|2776
|33

Encryption Algorithm Assignment
|6
|1103
|186

Assignment On Wireless Networking Concepts (Doc)
|9
|1534
|47

Wireless Networking Concepts
|5
|897
|471