Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
RSA
RSA
RSA - Ron Rivest, Adi Shamir and Len Adleman at MIT, in
1977.
General Information
best known & widely used public-key scheme
can be used to provide both secrecy & digital signatures
based on exponentiation in a finite field over integers
modulo a prime, using large integers (eg. 1024 bits)
secret
RSA En/Decryption
to encrypt a message M the sender:
obtains public key of recipient PU={e,n}
computes: c = me mod n, where 0m<n
(block if needed)
Compute n
n = pq =17 x 11=187
Encryption is
C = 887 mod 187
= 8363
Overall the Ciphertext is represented as the set of integers m
{8363,5017,11884,9546,13366}
Decryption is
the other
So, the basic operation involved, in either case, is
modular exponentiation
x
Power(x2, n/2)
x . Power(x2, (n-1)/2)
if n=1
if n = even
if n = odd
Algorithm Square_Multiply( , )
c = 0; f = 1
for i = k down to 0
do c = 2 * c
f = (f * f) mod n
if bi == 1 then
c=c+1
f = (f x a) mod n
return f
bi
17
35
70
14
0
28
0
56
0
49
15
7
52
6
16
0
24
1
29
8
16
6
67
THANK YOU