Public Key Encryption: RSA and AES Security and Performance Analysis

Verified

Added on  2022/12/23

|5
|982
|52
Discussion Board Post
AI Summary
This discussion post analyzes the security of public key encryption schemes, specifically focusing on the RSA and AES algorithms. The analysis begins with an examination of RSA's security, emphasizing the importance of integer factorization and its impact on the algorithm's vulnerability. It outlines the process of exploiting the RSA scheme by obtaining the private key and highlights the differences between RSA and AES, including their encryption mechanisms (asymmetric vs. symmetric). The post then compares the performance of RSA and AES, noting AES's superior speed and efficiency. The discussion extends to the practical applications of both algorithms, such as RSA in digital signatures and e-commerce security through SSL/TLS certificates, and AES in VPN services. The student concludes by outlining how RSA and AES would be utilized in developing a secure online e-commerce service.
Document Page
Running head: PUBLIC KEY ENCRYPTION SCHEME
PUBLIC KEY ENCRYPTION SCHEME
Name of student
Name of university
Author’s note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
PUBLIC KEY ENCRYPTION SCHEME
Analysis of RSA security: In the context of RSA security algorithm, the integer
factorization is the most significant aspect as it determines how secure the algorithm
is which is important for ensuring the security of the system (Meneses et al. 2016). If
the chosen integer is small then it is easy for the hackers to identify the factorization
of the integer which helps in the private key, this exploiting the security of the system.
However, it is important to note that with the proper application of computers,
factoring large integers is not complex to execute. Therefore, it is required to consider
that security of RSA algorithm depends on the condition that how easy or complex it
is to determine the factorization of the chosen integer.
Procedure to exploit RSA security: In order to exploit RSA scheme, private key is
required as public key is already known to people. The private key {n, d} is
determined applying public key {n, e} through the following steps (Yassein et al.
2017):
p and q is computed trough factorization of n
Then m is computed, m = (p-1)*(q-1)
Now d is computed with the formula, d*e mod m = 1 and private key {n, d} is
obtained
Difference between RSA and AES: The difference between RSA and AES is that
both encrypts and decrypts data through a different mechanism (Mukhopadhyay
2017). While RSA is an asymmetric encryption algorithm, AES is referred to as an
asymmetric encryption algorithm which is described in this context.
In RSA, data is encrypted with a public key and decrypted with a private key. If the
private key is not identified it is not possible to decrypt the data.
Document Page
2
PUBLIC KEY ENCRYPTION SCHEME
In AES, data is encrypted and decrypted with the same key and therefore, there is no
difference between the encryption and decryption key which is a significant
difference with the RSA encryption mechanism.
Analysis of performance of RSA and AES: In terms of performance comparison,
AES is better than RSA security algorithm.
In AES, the same key is considered for encryption and decryption of data and a large
amount of data is encrypted in this process. As AES is symmetric encryption it is
easier to implement as well. Along with that, it is faster as well compared to the RSA
encryption algorithm (Gupta and Kaushik 2017).
In order to ensure that it is not easy for hackers to identify the private key, it is
required that the chosen integer is significantly larger which makes the integer
factorization complex. Therefore, RSA is complex to implement and it is costly as
well. Therefore, in terms of performance, AES is often preferred compared to RSA
encryption algorithm as described in this context.
RSA and AES applications: RSA encryption algorithm is applied for digital
signatures to sign digital documents. The message is signed with a private key and if
the person has the corresponding public key, then it is easier for that person to verify
the authenticity of the file and ensure that the file was not exploited by others who are
not authorized to access the file (Raj and Solunke 2015).
AES algorithm is often applied to VPN service, to secure communication. VPN
allows to connect to a secure and private network through public network. As VPN
deploys AES encryption algorithm, it is easier to ensure data security even when
accessing the internet through the public network
Document Page
3
PUBLIC KEY ENCRYPTION SCHEME
RSA in e-commerce: In order to secure online e-commerce service, the website
integrates SSL/TLS certificate and for this RSA encryption algorithm is considered
(Meneses et al. 2016). It combines details of the organization with cryptographic key
digitally. When this is deployed in the web server, the padlock is activated and along
with that the https protocol is activated as well. This ensures that the communication
between the web server and the web browser is encrypted and secured as well.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
PUBLIC KEY ENCRYPTION SCHEME
References:
Gupta, A. and Kaushik, S., 2017. A Review: RSA and AES Algorithm. IITM Journal of
Management and IT, 8(1), pp.82-85.
Meneses, F., Fuertes, W., Sancho, J., Salvador, S., Flores, D., Aules, H., Castro, F., Torres, J.,
Miranda, A. and Nuela, D., 2016. RSA encryption algorithm optimization to improve
performance and security level of network messages. IJCSNS, 16(8), p.55.
Mukhopadhyay, D., 2017. Cryptography: Advanced Encryption Standard
(AES). Encyclopedia of Computer Science and Technology, 279.
Raj, R. and Solunke, Y.S., 2015. A Modified RSA Cryptosystems and
Analysis. International Journal of Emerging Science and Engineering, pp.1-3.
Yassein, M.B., Aljawarneh, S., Qawasmeh, E., Mardini, W. and Khamayseh, Y., 2017,
August. Comprehensive study of symmetric key and asymmetric key encryption algorithms.
In 2017 international conference on engineering and technology (ICET) (pp. 1-7). IEEE.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]