RSA ALGORITHM Name of the University Author Note RSA ALGORITHM Name of the Student Name of the University Author Note RSA ALGORITHM RSA ALGORITHM Name of the Author of the University
Verified
Added on 2023/04/22
|3
|472
|239
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: RSA ALGORITHM RSA ALGORITHM Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1RSA ALGORITHM RSA and its history and its methodology and application: The RSA is the Rivest-Shamir-Adleman (RSA) algorithm which is based on a cryptosystem. The cryptographic algorithms are basically used for the specific types of purposes or services. The RSA algorithm is first introduced in the year 1977 by three scientists of MIT namely Adi Shamir, Ron Rivest and Leonard Adleman. It was the extension of a public key algorithm introduced by British mathematician Clifford Cocks in the year 1973 (Srivastava and Srivastava 2018). In the RSA cryptography method both keys namely the public and the private keys are utilized to encrypt a particular message. The key which is opposite of the encryption key is used for decryption of the message. For this particular property the RSA is the mostly used asymmetric algorithm. This gives the advantage for maintaining integrity, confidentiality, authenticity and non-repudiation for the data storage and electronic communication. Most of the networking and internetworking protocols like the OpenPGP, Secure Shell, SSL/TLS and S/MIME are using the RSA for the encryption (Zarlis and Sembiring 2016). This is also used in the software based programs like the browsers as a secure connection is needed to be established over an insecure network like in internet. This algorithm can also be used for the validation of the digital signatures. The signature verification by RSA algorithm is the most popular technique which is used in many network attached systems. The Caesar Cipher is one of the oldest technique for encryption. The algorithm of the Caesar Cipher for a letter x for shift n is given by En(x) = (x+n) mod 26 (Gowda 2016). Let the 13 digit word “GIVEMEFREEDOM” is shifted by 4. So, the Cypher encrypted word will be “KMZIQIJVIIHSQ”.
2RSA ALGORITHM References: Gowda, S.N., 2016, September. Innovative enhancement of the Caesar cipher algorithm for cryptography. InInternational Conference on Advances in Computing, Communication, & Automation (ICACCA). Srivastava, S. and Srivastava, A., 2018. Integration of RSA and Waterfall Framework: Aggrandize Security in Cloud Computing using Integration of Rivest–Shamir–Adleman (Encryption Algorithm) and Waterfall Model.Journal of Microcontroller Engineering and Applications,4(3), pp.1-8. Zarlis, M. and Sembiring, R.W., 2016. Analisis Kinerja Kombinasi Algoritma Message- Digest Algortihm 5 (Md5), Rivest Shamir Adleman (Rsa) dan Rivest Cipher 4 (Rc4) pada Keamanan E-Dokumen.