Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

How does the RSA security work?

user-image
Question added by Samar Saleh , Community Manager , Bayt.com
Date Posted: 2013/07/01

apublic encryption key it sends to Bob. 
        a private decryption key that keeps carefully. 
    Bob uses the public key to encrypt the message and pass it to Alice. 
    Alice uses the private key to decrypt the message received .
Key Generation     Are two major"randomly" chosen prime numbers p and q. 
    Note: n = p*q and φ=(p-1) * (q-1)     D be a big integer"randomly" selected, first with φ.
And the inverse of e modulo φ. 
     Public key encryption is the pair(n,e), the private decryption key the pair (n, d).
****Encryption /Decryption****
1- encryption      Before being encrypted, the original message must be broken down into a series of integers M values ​​between0 and n-1. 
     For each integer M must be calculated C≡M^e[n]. 
     The encrypted message is made up o fthe sequence of integers C.decryption     According to how it was encrypted, the message will becomposed of a sequenceof integers Cvalues ​​between0and n-1. 
    For each integer C must calculate M≡C^ d[n]. 
    The original message can then be reconstructed from the whole series M.

More Questions Like This

Do you need help in adding the right keywords to your CV? Let our CV writing experts help you.