wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

RSA (Rivest-Shamir-Adelman) Algorithm

profile
Jermin Shaikh
Apr 27, 2023
0 Likes
0 Discussions
134 Reads

When using RSA for encryption and decryption of general data, it reverses the key set usage. Unlike signature verification, it uses the receiver’s public key to encrypt the data, and it uses the receiver’s private key in decrypting the data. Thus, there is no need to exchange any keys in this scenario.

 

There are two broad components when it comes to RSA cryptography, they are: 

  • Key Generation: Generating the keys to be used for encrypting and decrypting the data to be exchanged.
  • Encryption/Decryption Function: The steps that need to be run when scrambling and recovering the data.

 

You need to generate public and private keys before running the functions to generate your ciphertext and plaintext. They use certain variables and parameters, all of which are explained below:

  • Choose two large prime numbers (p and q)
  • Calculate n = p*q and z = (p-1)(q-1)
  • Choose a number e where 1 < e < z
  • Calculate d = e-1mod(p-1)(q-1)
  • You can bundle private key pair as (n,d)
  • You can bundle public key pair as (n,e)

adv-RSA_Algorithm.

  • No Key Sharing: RSA encryption depends on using the receiver’s public key, so you don’t have to share any secret key to receive messages from others.
  • Proof of Authenticity: Since the key pairs are related to each other, a receiver can’t intercept the message since they won’t have the correct private key to decrypt the information.
  • Faster Encryption: The encryption process is faster than that of the DSA algorithm.
  • Data Can’t Be Modified: Data will be tamper-proof in transit since meddling with the data will alter the usage of the keys. And the private key won’t be able to decrypt the information, hence alerting the receiver of manipulation.

Comments ()


Sign in

Read Next

ASANA- A Management System.

Blog banner

Some facts about Technology

Blog banner

Operating system and overviews

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

MailChimp

Blog banner

I/O Buffering

Blog banner

Types of Threads

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

Virtual memory

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

CRISP-DM Methodology

Blog banner

Cloud Security: Trends and Innovations

Blog banner

A book review

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

STARVATION

Blog banner

Hello World

Blog banner

The Peephole

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

Senseless Teeths

Blog banner

Memory Management

Blog banner

GUIDE TO GIS

Blog banner

Deadlock and Starvation

Blog banner

NETSUITE

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Os Virtual Memory

Blog banner

Security issues

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

Service Design Principles

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

Stop Racism

Blog banner

HR Automation : Need of the hour

Blog banner

objectives and function of operating system

Blog banner

Memory

Blog banner

RAID

Blog banner

Deadlock in operating system

Blog banner

Landslide Hazard

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

Short note on Microsoft office

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

Deadlock and Starvation

Blog banner