File-encryption-and-decryption-system-based-on-RSA-algorithm
File-encryption-and-decryption-system-based-on-RSA-algorithm
798
Use above modulus multiplication algorithm constructs an array b [ ], size is a prime number
by combining the above described power modulus search range, the size of search range is minded
algorithm, it can constitute a standard power
variable SS. Array b [0] to b [SS] correspond to
module Montgomery algorithm, which is the
software used by the process described below: the large number Start to Start + SS. First of all
We can use the Mul method and Exp method does meet this relationship may not be a prime
number. Then we change variable A, for several
of class of Monty in the practical realization. The
tests, if several tests are passed, the probability that
global function Modexp can initialize the object of this number is prime number is relatively large. By
Monty and call it’s exp method, we can directly this principle, we write the following test functions
799
return 1; and text files under the environment which
} demand a high security, such as in public forums.
If testing passed, the number is a prime
REFERENCES
number and will pass to previous program to use.
And here may be also another problem which can’t [1] Montgomery PL, Modular multiplication
be neglected, it is to get a composite number which without trialdivision[J], Mathematics of
can pass this test. In this case, it is to validate it Computation, 1985
from mathematical point of view that if RSA [2] Oh JH,Moon S J, Modular multiplication
encryption can be realized or not. After get a large method˷J˹, IEE Proceedings˖Computers and
prime number, that is parameter p and q in the Digital Tech-niques, 1998
RSA algorithm, we can calculate the key, also the [3] Shi Xiangdong, Dong Ping, a new core
encryption operation. design based on the RSA encryption algorithm,
micro-computer information, period 2005 12-3
CONCLUSION [4] [AX931] ANSI X9.31-1998 Digital
RSA algorithm encryption used in file Signatures using Reversible Public Key
encryption for small files, any file with asymmetric Cryptography for the Financial Services Industry
key encryption into its text can be more convenient (rDSA), Appendix A, American National
to communicate and manage, and it has broad Standards Institute, 1998ˊ
development prospects. The project application [5] [COCK73] Clifford Cocks, A Note on
was designed to take the efficiency and reusability 'Non-Secret Encryption', CESG Research Reportˈ
into account. The whole project opens source code 20 November 1973
and a variety of development information; it is [6] [KALI93] Burton Kalinski, Some
convenient for the reference and continuous Examples of the PKCS Standards, RSA
development. Application of this procedure can Laboratories, November 1993
easily communicate data including arbitrary binary
800