0% found this document useful (0 votes)
14 views

Secure Communications

Uploaded by

michaelmahrous63
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Secure Communications

Uploaded by

michaelmahrous63
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Application of RSA

Algorithm in
Secure
Communications
1. Introduction

The RSA (Rivest–Shamir–Adleman) algorithm is a public-key

cryptosystem widely used for secure data transmission It is one of

the most old and robust method of secure communication that

provides a very secure method for communication over not so

very trusted networks. So speaking of secure communications,

RSA plays quite an important role in protocols like SSH (Secure

Shell) and HTTPS (Hypertext Transfer Protocol Secure).


2. Importance

RSA encryption is extremely important for internet messaging as

it provides legitimacy and security. It is used widely in signatures

that are digital , secure communication protocols like SSH and

HTTPS, encrypting email messages, virtual private networks, and

software protection. However, it’s not so often used alone as an

encryption method as it can use too much resources. Though still

it’s importance cannot be underestimated. And it is pretty crucial

in modern encryption technologies.


3. Full Description

RSA is works on two different keys: a public key for encryption

and a private key for decryption .The public key is readily

available to everyone, while the private key is the key that is

remained secret . This asymmetric nature of RSA cryptography

makes sure that even if a third party does have access to the

public key, they do not have the facilities to decrypt the data so in

the case of application of secure communications, RSA is used in

protocols like SSH for the ability to securely access to remote

computers and HTTPS for secure web browsing¹⁶. In both these ,

RSA encryption secures the connection between the client (like a

web browser or an SSH client) and the server, protecting

important information such as login and credit card details.


4. Mathematics

The RSA algorithm relies on the idea that it is hard (both for

computer, supercomputer and human) to factorize a very large

integer. The public key is consisted of two numbers where one

number is basically two large prime numbers multiplied with each

other and the private key is also derived from the same two prime

numbers and so Therefore, the ability to encrypt totally relies on

the key size


5. Numerical Example

Example

Let p=7, q=19

N = p*q = 133

2. φ(n) = (p-1)*(q-1) = 108

3. choose e, Coprime of φ(n), gcd(e,108)=1

E=2 ) gcd(108,2) ≠ 1

E=3 ) gcd(108,3) ≠ 1

E=5 ) gcd(108,5) = 1 ✓

4. Find integer d such that de mod φ(n)=1

K(-13), d=-13+5*22 , d=-13+110 , d=97 ✗

K(-12), d=-12+5*21 , d=-12+105 , d=93 ✗

K(-11), d=-11+5*20 , d=-11+100 , d=89 ✗

K(-10), d=-10+5*19 , d=-10+95 , d=85 ✓

Public Key: n=133, e=5

Secret Key: p=7,q=19,d=85

Encryption:

P = 6 (ASCII – G)

C = P^e mod n = 6^5 mod133

Decryption:

C:62

P:62^d mod n

Msg [31][75][31] -> [62]


6. References

1. RSA Algorithm in Cryptography - GeeksforGeeks

2. RSA (cryptosystem) - Wikipedia

3. RSA Encryption and RSA Algorithm: A Comprehensive

Overview

4. What Is RSA Algorithm in Cryptography and How Does It

Work?

You might also like