Mod Iii
Mod Iii
RSA Algorithm
1. Introduc on to RSA:
RSA is one of the most widely used asymmetric encryp on algorithms.
Named a er its inventors: Rivest, Shamir, and Adleman.
Relies on the computa onal difficulty of factoring large composite numbers.
2. Steps in RSA:
Key Genera on:
Choose two large prime numbers p and q.
Compute n=p×q (modulus) and ϕ(n)=(p−1)(q−1) (Euler’s to ent).
Select a public key e such that 1<e<ϕ(n) and gcd(e,ϕ(n))=1.
Compute the private key d such that (e×d)modϕ(n)=1.
Encryp on:
Decryp on:
3. Applica ons:
Secure data transmission.
Digital signatures.
Symmetric & Asymmetric Key Cryptography Together
Hybrid Cryptography:
Digital Signature
1. Defini on:
A digital signature is a cryptographic technique for verifying the authen city and integrity of
a digital message or document.
2. Steps in Digital Signature Process:
Signing:
1. Logic of SHA-512:
Part of the SHA-2 family.
Produces a 512-bit hash output.
Processes data in 1024-bit blocks.
2. SHA-512 Round Func on:
Message Preprocessing:
Padding: Extend the message length to a mul ple of 1024 bits.
Parsing: Divide the padded message into 1024-bit blocks.
Ini alize hash values and constants.
Compression Func on:
Applies 80 rounds of opera ons.
Each round uses logical func ons (AND, OR, XOR), modular addi on, and bitwise shi s.
Finaliza on:
Combines intermediate hash values to produce the final 512-bit digest.