0% found this document useful (0 votes)
20 views1 page

Encryption Techniques. Rsa Algorithm: Objective

This document outlines the procedure for a laboratory experiment to implement and test the RSA encryption and decryption algorithms. The procedure involves opening a text file containing team members' names, reading the file into a vector, choosing prime numbers to generate the encryption and decryption keys, encrypting the vector using the encryption key, decrypting the encrypted vector using the decryption key, and analyzing any difficulties encountered with implementing the RSA algorithms.

Uploaded by

leileilei65
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views1 page

Encryption Techniques. Rsa Algorithm: Objective

This document outlines the procedure for a laboratory experiment to implement and test the RSA encryption and decryption algorithms. The procedure involves opening a text file containing team members' names, reading the file into a vector, choosing prime numbers to generate the encryption and decryption keys, encrypting the vector using the encryption key, decrypting the encrypted vector using the decryption key, and analyzing any difficulties encountered with implementing the RSA algorithms.

Uploaded by

leileilei65
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

LABORATORY: INTRODUCTION TO COMMUNICATIONS

ENCRYPTION TECHNIQUES. RSA ALGORITHM

OBJECTIVE:

IMPLEMENT AND TEST THE RSA ENCODING AND DECODING ALGORITHMS

PROCEDURE:

1. Create a text file (.txt) containing the first names of the team members (use space as word separator).

2. Open the file in MATLAB (use fopen). Display the file identifier (fid).

3. Read the file in MATLAB (use fread). Display the vector f, containing the decimal ASCII character

codes.

4. Display the content of the file in MATLAB (use setstr)

5. Choose a pair of distinct prime numbers (p, q) that will be used for RSA code design.

the numbers will be chosen so that the code can process individually each byte, character-by- character .

6. Deduce the encryption and decryption keys: (e,n),(d,n).

**** If d = e, change the pair of numbers (p,q).

7. Implement the RSA encoding algorithm (the spaces between words are not encrypted).

8. Encode vector f using your encryption key. Display the coded vector (c). Display the encrypted

characters, corresponding to the coded vector (c).

9. Implement the RSA decoding algorithm.

10. Decrypt c using your decryption key (denote the decrypted vector as v). Display the decrypted text.

CONCLUSIONS:

What difficulties did you meet by implementing the RSA encryption and decryption algorithms?

Make some comments and recommendations.

You might also like