RSA Algorithm: Exploring Encryption, Decryption, and Applications

Verified

Added on  2023/04/22

|3
|472
|239
Report
AI Summary
This report examines the RSA algorithm, a fundamental concept in cryptography. It begins with an introduction to the RSA algorithm and its origins, including the contributions of Rivest, Shamir, and Adleman. The report then explores the methodology of the RSA algorithm, including its use of public and private keys for encryption and decryption, and its role in maintaining data integrity, confidentiality, authenticity, and non-repudiation. It includes a brief explanation of the Caesar Cipher as a historical encryption method. The report highlights the applications of the RSA algorithm in various networking and internetworking protocols such as OpenPGP, Secure Shell, SSL/TLS, and S/MIME, and software-based programs like web browsers. The report also discusses the use of the RSA algorithm in validating digital signatures. The report concludes with references to relevant sources.
Document Page
Running head: RSA ALGORITHM
RSA ALGORITHM
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1RSA ALGORITHM
RSA and its history and its methodology and application:
The RSA is the Rivest-Shamir-Adleman (RSA) algorithm which is based on a
cryptosystem. The cryptographic algorithms are basically used for the specific types of
purposes or services. The RSA algorithm is first introduced in the year 1977 by three
scientists of MIT namely Adi Shamir, Ron Rivest and Leonard Adleman. It was the extension
of a public key algorithm introduced by British mathematician Clifford Cocks in the year
1973 (Srivastava and Srivastava 2018). In the RSA cryptography method both keys namely
the public and the private keys are utilized to encrypt a particular message. The key which is
opposite of the encryption key is used for decryption of the message. For this particular
property the RSA is the mostly used asymmetric algorithm. This gives the advantage for
maintaining integrity, confidentiality, authenticity and non-repudiation for the data storage
and electronic communication. Most of the networking and internetworking protocols like the
OpenPGP, Secure Shell, SSL/TLS and S/MIME are using the RSA for the encryption (Zarlis
and Sembiring 2016). This is also used in the software based programs like the browsers as a
secure connection is needed to be established over an insecure network like in internet. This
algorithm can also be used for the validation of the digital signatures. The signature
verification by RSA algorithm is the most popular technique which is used in many network
attached systems.
The Caesar Cipher is one of the oldest technique for encryption. The algorithm of the Caesar
Cipher for a letter x for shift n is given by En(x) = (x+n) mod 26 (Gowda 2016).
Let the 13 digit word “GIVEMEFREEDOM” is shifted by 4.
So, the Cypher encrypted word will be “KMZIQIJVIIHSQ”.
Document Page
2RSA ALGORITHM
References:
Gowda, S.N., 2016, September. Innovative enhancement of the Caesar cipher algorithm for
cryptography. In International Conference on Advances in Computing, Communication, &
Automation (ICACCA).
Srivastava, S. and Srivastava, A., 2018. Integration of RSA and Waterfall Framework:
Aggrandize Security in Cloud Computing using Integration of Rivest–Shamir–Adleman
(Encryption Algorithm) and Waterfall Model. Journal of Microcontroller Engineering and
Applications, 4(3), pp.1-8.
Zarlis, M. and Sembiring, R.W., 2016. Analisis Kinerja Kombinasi Algoritma Message-
Digest Algortihm 5 (Md5), Rivest Shamir Adleman (Rsa) dan Rivest Cipher 4 (Rc4) pada
Keamanan E-Dokumen.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]