Download presentation
Presentation is loading. Please wait.
Published byAudrey Brooks Modified over 9 years ago
1
Algebra of RSA codes Yinduo Ma Tong Li
2
Ron Rivest, Adi Shamir and Leonard Adleman
4
Operation The RSA algorithm involves three steps Key generation Encryption Decryption
5
Operation
6
Example Choose p = 3 and q = 11 Compute n = p * q = 3 * 11 = 33 Compute φ (n) = (p - 1) * (q - 1) = 2 * 10 = 20 Choose e such that 1 < e < φ (n) and e and n are coprime. Let e = 7 Compute a value for d such that (d * e) % φ (n) = 1. One solution is d = 3 [(3 * 7) % 20 = 1] Public key is (e, n) => (7, 33) Private key is (d, n) => (3, 33) The encryption of m = 2 is c = 2 7 % 33 = 29 The decryption of c = 29 is m = 29 3 % 33 = 2
7
Proof Proof using Fermat's little theorem Proof using Euler's theorem
8
Proof Euler's theorem Goal to show m ed ≡ m (mod n ) n = pq ed ≡ 1 (mod φ ( n )). ed = 1 + h φ ( n ) Assuming that m is relatively prime to n, we have By Euler's theorem.
9
Signing message
10
Attacks Timing attacks Adaptive chosen ciphertext attacks Side-channel analysis attacks
11
Exam question Our public key is (7,33) pravit key is (3,33) A ciphertext is 10, please decryption it. The decryption of c = 10 is m = 10 3 % 33 = 10
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.