SlideShare a Scribd company logo
RSA Algorithm:


   1. Select two very large prime numbers.

   2.   n = p.q

   3. ɸ = (p - 1).(q - 1)

   4.   Select e; such that, e is relatively prime to ɸ and

                                e < ɸ, gcd (e, ɸ) = 1

   5. Select d; such that, d.e mod ɸ = 1 or

                                e = 1 mod ɸ

   6. Public key : {e, n}

        Private key : {d, n}

   7. e = pe mod n

        p = cd mod n




Example:


   1. p = 3, q = 11

   2. n = 3 x 11 = 33

   3. ɸ = (3 – 1).(11 – 1) = 2 x 10 = 20

   4. e = 3, 7, 9, 11, 13, 17, 19
                                                        d = 1, 3 mod 20 ≠ 1
   5. d = 7,                    d.e mod 20 = 1
                                                        d = 2, 6 mod 20 ≠ 1
                                d.3 mod 20 = 1          d = 3, 9 mod 20 ≠ 1
                                                        d = 4, 12 mod 20 ≠ 1
   8. Public key : {33, 33}                             d = 5, 15 mod 20 ≠ 1
                                                        d = 6, 18 mod 20 ≠ 1
        Private key : {7, 33}
                                                        d = 7, 21 mod 20 = 1
Diffe-Hellman Protocol:


       k = gxy mod p




                  Alice                                                     Bob


               R1 gx mod p                                              R2 gy mod p

                                   R                           R




          k = R2x mod p                                            k = R1y mod p
            = (gy mod p)x mod p                                     = (gx mod p)y mod p
            = gxy mod p                                             = gxy mod p




                                         k is the shared key

p and g : two large number with some properties.

More Related Content

What's hot (20)

PDF
Elliptic Curve Cryptography
Kelly Bresnahan
 
PPT
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Information Security Awareness Group
 
PPTX
Homomorphic Encryption
Victor Pereira
 
PDF
RSA Algorithm report
Mohamed Ramadan
 
PPTX
Al-Gamal-W6(al gamal)-d1-d2
Fahad Layth
 
DOCX
Number Theory In Cryptography
Aadya Vatsa
 
PDF
Data Security Using Elliptic Curve Cryptography
IJCERT
 
PDF
A survey on Fully Homomorphic Encryption
iosrjce
 
PPTX
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
NIT Sikkim
 
PPTX
RSA ALGORITHM
Sathish Kumar
 
PPTX
Improved security system using steganography and elliptic curve crypto...
atanuanwesha
 
PDF
Elliptic Curve Cryptography and Zero Knowledge Proof
Arunanand Ta
 
PDF
Introduction to Homomorphic Encryption
Christoph Matthies
 
PDF
Ntewrok secuirty cs7
Infinity Tech Solutions
 
PPT
The rsa algorithm
Marwa Hashem elsherif
 
PPT
The rsa algorithm
alagumani1984
 
PPTX
Rsa Crptosystem
Amlan Patel
 
PDF
Understanding CTLE
继顺(Jeffrey) 王
 
PPTX
Information and data security other public key cryptosystems
Mazin Alwaaly
 
Elliptic Curve Cryptography
Kelly Bresnahan
 
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Information Security Awareness Group
 
Homomorphic Encryption
Victor Pereira
 
RSA Algorithm report
Mohamed Ramadan
 
Al-Gamal-W6(al gamal)-d1-d2
Fahad Layth
 
Number Theory In Cryptography
Aadya Vatsa
 
Data Security Using Elliptic Curve Cryptography
IJCERT
 
A survey on Fully Homomorphic Encryption
iosrjce
 
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
NIT Sikkim
 
RSA ALGORITHM
Sathish Kumar
 
Improved security system using steganography and elliptic curve crypto...
atanuanwesha
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Arunanand Ta
 
Introduction to Homomorphic Encryption
Christoph Matthies
 
Ntewrok secuirty cs7
Infinity Tech Solutions
 
The rsa algorithm
Marwa Hashem elsherif
 
The rsa algorithm
alagumani1984
 
Rsa Crptosystem
Amlan Patel
 
Understanding CTLE
继顺(Jeffrey) 王
 
Information and data security other public key cryptosystems
Mazin Alwaaly
 

Similar to Rsa Algorithm (20)

PDF
Newfile6
David Rogers
 
PPT
P10co982 (2)
bharatsvnit
 
PDF
Problem
David Rogers
 
PDF
Ki2518101816
IJERA Editor
 
PDF
Ki2518101816
IJERA Editor
 
PDF
Dual Gravitons in AdS4/CFT3 and the Holographic Cotton Tensor
Sebastian De Haro
 
PDF
Number theory lecture (part 2)
Aleksandr Yampolskiy
 
PDF
Number Theory and Its Applications in Cryptography
kapilhande1
 
PDF
Active Attacks on DH Key Exchange
Dharmalingam Ganesan
 
PPT
Time complexity
LAKSHMITHARUN PONNAM
 
ZIP
Sol Purcell Ingles
Natasha Flores
 
PDF
Use Theorem 14.1 to show that for all odd n= 3 we have D2n is isomo.pdf
aratextails30
 
PDF
metodos_abreviados de ecuciones diferenciales
juanpablohilari
 
PDF
metodos_abreviados.ecuaciones diferenciales
juanpablohilari
 
PDF
lecture10.pdf
AlaaElhaddad3
 
PDF
Complex analysis notes
Prakash Dabhi
 
PPT
Matrix part 3.2 (1)
Ghanshyam Tewani
 
PDF
Modeling An Rational Integral With Saber State Ams
domnitei
 
PDF
Notes up to_ch7_sec3
neenos
 
PDF
Notes up to_ch7_sec3
Leonardo Nosce
 
Newfile6
David Rogers
 
P10co982 (2)
bharatsvnit
 
Problem
David Rogers
 
Ki2518101816
IJERA Editor
 
Ki2518101816
IJERA Editor
 
Dual Gravitons in AdS4/CFT3 and the Holographic Cotton Tensor
Sebastian De Haro
 
Number theory lecture (part 2)
Aleksandr Yampolskiy
 
Number Theory and Its Applications in Cryptography
kapilhande1
 
Active Attacks on DH Key Exchange
Dharmalingam Ganesan
 
Time complexity
LAKSHMITHARUN PONNAM
 
Sol Purcell Ingles
Natasha Flores
 
Use Theorem 14.1 to show that for all odd n= 3 we have D2n is isomo.pdf
aratextails30
 
metodos_abreviados de ecuciones diferenciales
juanpablohilari
 
metodos_abreviados.ecuaciones diferenciales
juanpablohilari
 
lecture10.pdf
AlaaElhaddad3
 
Complex analysis notes
Prakash Dabhi
 
Matrix part 3.2 (1)
Ghanshyam Tewani
 
Modeling An Rational Integral With Saber State Ams
domnitei
 
Notes up to_ch7_sec3
neenos
 
Notes up to_ch7_sec3
Leonardo Nosce
 
Ad

More from Ashik Iqbal (17)

PDF
Document Archiving & Sharing System
Ashik Iqbal
 
PDF
Document Archiving & Sharing System
Ashik Iqbal
 
PPS
We Forgot
Ashik Iqbal
 
PDF
Al quran-er-arobi-shikhi
Ashik Iqbal
 
DOC
Virtual Memory vs Cache Memory
Ashik Iqbal
 
PPTX
Cloud Computing
Ashik Iqbal
 
PPTX
Commercially Available Fiber Optic Cables
Ashik Iqbal
 
DOC
Pipeline Mechanism
Ashik Iqbal
 
DOC
Advanced Artificial Intelligence
Ashik Iqbal
 
PDF
Profit From Ramadan
Ashik Iqbal
 
PPT
Mobile/Digital Wallet
Ashik Iqbal
 
PPT
Prophets Graves
Ashik Iqbal
 
DOC
Cryprography Assignment
Ashik Iqbal
 
PPTX
Cryptography Ashik
Ashik Iqbal
 
PPS
My Abokash
Ashik Iqbal
 
PDF
Handbook Of Islamic Banking
Ashik Iqbal
 
PPS
The Window
Ashik Iqbal
 
Document Archiving & Sharing System
Ashik Iqbal
 
Document Archiving & Sharing System
Ashik Iqbal
 
We Forgot
Ashik Iqbal
 
Al quran-er-arobi-shikhi
Ashik Iqbal
 
Virtual Memory vs Cache Memory
Ashik Iqbal
 
Cloud Computing
Ashik Iqbal
 
Commercially Available Fiber Optic Cables
Ashik Iqbal
 
Pipeline Mechanism
Ashik Iqbal
 
Advanced Artificial Intelligence
Ashik Iqbal
 
Profit From Ramadan
Ashik Iqbal
 
Mobile/Digital Wallet
Ashik Iqbal
 
Prophets Graves
Ashik Iqbal
 
Cryprography Assignment
Ashik Iqbal
 
Cryptography Ashik
Ashik Iqbal
 
My Abokash
Ashik Iqbal
 
Handbook Of Islamic Banking
Ashik Iqbal
 
The Window
Ashik Iqbal
 
Ad

Recently uploaded (20)

PPTX
How to Create Rental Orders in Odoo 18 Rental
Celine George
 
PDF
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
PPTX
PPT on the Development of Education in the Victorian England
Beena E S
 
PDF
IMP NAAC-Reforms-Stakeholder-Consultation-Presentation-on-Draft-Metrics-Unive...
BHARTIWADEKAR
 
PPTX
Accounting Skills Paper-I, Preparation of Vouchers
Dr. Sushil Bansode
 
PPSX
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
PDF
BÀI TẬP BỔ TRỢ THEO LESSON TIẾNG ANH - I-LEARN SMART WORLD 7 - CẢ NĂM - CÓ ĐÁ...
Nguyen Thanh Tu Collection
 
PPTX
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
PDF
community health nursing question paper 2.pdf
Prince kumar
 
PPTX
Nutri-QUIZ-Bee-Elementary.pptx...................
ferdinandsanbuenaven
 
PDF
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
PPTX
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
PPTX
ROLE OF ANTIOXIDANT IN EYE HEALTH MANAGEMENT.pptx
Subham Panja
 
PPSX
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
PPTX
How to Manage Promotions in Odoo 18 Sales
Celine George
 
PPTX
2025 Winter SWAYAM NPTEL & A Student.pptx
Utsav Yagnik
 
PDF
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
PPTX
Presentation: Climate Citizenship Digital Education
Karl Donert
 
PPTX
How to Configure Access Rights of Manufacturing Orders in Odoo 18 Manufacturing
Celine George
 
PDF
The-Beginnings-of-Indian-Civilisation.pdf/6th class new ncert social/by k san...
Sandeep Swamy
 
How to Create Rental Orders in Odoo 18 Rental
Celine George
 
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
PPT on the Development of Education in the Victorian England
Beena E S
 
IMP NAAC-Reforms-Stakeholder-Consultation-Presentation-on-Draft-Metrics-Unive...
BHARTIWADEKAR
 
Accounting Skills Paper-I, Preparation of Vouchers
Dr. Sushil Bansode
 
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
BÀI TẬP BỔ TRỢ THEO LESSON TIẾNG ANH - I-LEARN SMART WORLD 7 - CẢ NĂM - CÓ ĐÁ...
Nguyen Thanh Tu Collection
 
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
community health nursing question paper 2.pdf
Prince kumar
 
Nutri-QUIZ-Bee-Elementary.pptx...................
ferdinandsanbuenaven
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
ROLE OF ANTIOXIDANT IN EYE HEALTH MANAGEMENT.pptx
Subham Panja
 
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
How to Manage Promotions in Odoo 18 Sales
Celine George
 
2025 Winter SWAYAM NPTEL & A Student.pptx
Utsav Yagnik
 
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
Presentation: Climate Citizenship Digital Education
Karl Donert
 
How to Configure Access Rights of Manufacturing Orders in Odoo 18 Manufacturing
Celine George
 
The-Beginnings-of-Indian-Civilisation.pdf/6th class new ncert social/by k san...
Sandeep Swamy
 

Rsa Algorithm

  • 1. RSA Algorithm: 1. Select two very large prime numbers. 2. n = p.q 3. ɸ = (p - 1).(q - 1) 4. Select e; such that, e is relatively prime to ɸ and e < ɸ, gcd (e, ɸ) = 1 5. Select d; such that, d.e mod ɸ = 1 or e = 1 mod ɸ 6. Public key : {e, n} Private key : {d, n} 7. e = pe mod n p = cd mod n Example: 1. p = 3, q = 11 2. n = 3 x 11 = 33 3. ɸ = (3 – 1).(11 – 1) = 2 x 10 = 20 4. e = 3, 7, 9, 11, 13, 17, 19 d = 1, 3 mod 20 ≠ 1 5. d = 7, d.e mod 20 = 1 d = 2, 6 mod 20 ≠ 1 d.3 mod 20 = 1 d = 3, 9 mod 20 ≠ 1 d = 4, 12 mod 20 ≠ 1 8. Public key : {33, 33} d = 5, 15 mod 20 ≠ 1 d = 6, 18 mod 20 ≠ 1 Private key : {7, 33} d = 7, 21 mod 20 = 1
  • 2. Diffe-Hellman Protocol: k = gxy mod p Alice Bob R1 gx mod p R2 gy mod p R R k = R2x mod p k = R1y mod p = (gy mod p)x mod p = (gx mod p)y mod p = gxy mod p = gxy mod p k is the shared key p and g : two large number with some properties.