0% found this document useful (0 votes)
28 views4 pages

To Implement RSA Algorithm.: Evaluation: Sr. No Rubric Grade

This document summarizes a student's implementation of the RSA encryption algorithm for a cryptography class. It provides background on RSA, describing that it uses two keys - a public encryption key and a private decryption key. The document outlines the RSA algorithm steps: 1) generating large prime numbers p and q, 2) computing n as p * q, 3) finding the public key e relatively prime to (p-1)(q-1), 4) finding the private key d such that (e*d) mod ((p-1)(q-1)) equals 1, 5) encrypting a plain text PT as cipher text CT = PT^e mod n, and 6) decrypting as PT = CT^d mod

Uploaded by

Capriya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views4 pages

To Implement RSA Algorithm.: Evaluation: Sr. No Rubric Grade

This document summarizes a student's implementation of the RSA encryption algorithm for a cryptography class. It provides background on RSA, describing that it uses two keys - a public encryption key and a private decryption key. The document outlines the RSA algorithm steps: 1) generating large prime numbers p and q, 2) computing n as p * q, 3) finding the public key e relatively prime to (p-1)(q-1), 4) finding the private key d such that (e*d) mod ((p-1)(q-1)) equals 1, 5) encrypting a plain text PT as cipher text CT = PT^e mod n, and 6) decrypting as PT = CT^d mod

Uploaded by

Capriya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

Academic Term: July-Nov 2015

Class
: B.E
Subject Name: Cryptography and System Security
Practical No:
Title:

3
To implement RSA Algorithm.

Date of
Performance:
Date of
Submission:
Roll No:
Name of the
Student:

6779
Priyadarshini Ashokan

Evaluation:
Sr. No

Rubric

On time submission
Or completion (2)

Preparedness(2)

Skill (4)

Output (2)

Signature of the Teacher:


Date:

Grade

Title: To implement RSA Algorithm.


RIVEST SHAMIR ADELMAN ALGORITHM

Lab Objective :
This lab provides insight into:

How the public-key algorithms work and understand the working of


RSA.

Reference : Cryptography and Network Security B. A. Forouzan


Information Security Principles and Practice Mark
Stamp
Cryptography and Network Security Atul Kahate

Prerequisite :

Java and Knowledge of Ciphering .

Theory:
RSA crypto system is a public key system. RSA is similar to other
methods in which solving the cryptosystem amounts to finding terms that
add to a particular sum or multiply to a particular product. It relies on
number theory. 2 Keys 'd' n 'e'are used for encryption and decryption. They
are interchangeable. The plain text block P is encrypted as P^e mod n. The
decryption key is carefully chosen so that P^ed mod n=P. Thus the
legitimate receiver who knows 'd; simply computes P^ed mod n=P and P
without having factor P^e.
ALGORITHM:
1) Start.
2) Find 2 large prime numbers i.e approx 100 digit prime numbers 'p' and 'q'.
3) Compute n=p*q where n is also 200 digit number.
4) Find 'e' which is realtively prime wrt (p-1)(q-1).
5) Find 'd' such that (e*d) mod ((p-1)(q-1))=1.
6) Cipher text is obtained by CT= PT^e mod n.
7) Decrypt using PT= CT^d mod n.
8) Stop.

Example of RSA

Conclusion:
The program was tested for different sets of inputs.
Program is working
SATISFACTORY
NOT SATISFACTORY
( Tick appropriate outcome)

Post Lab Assignment:


Test above an experiment to estimate the amount of time to
i) Generate key pair (RSA)
ii) Encrypt n bit message (RSA)
iii) Decrypt n bit message (RSA)
As function of key size, experiment with different n-bit messages. Summarize your
conclusion.

You might also like