Skip to main content

The RSA Public-Key Encryption Algorithm

  • Reference work entry
  • 251 Accesses

Definition:The RSA is one of the popular public-key encryption algorithms.

Rivest et al published a method for obtaining digital signatures and public-key cryptosystems in 1978 [1]. In order to use the method, the encryption and decryption keys must be chosen as follows:

  1. 1.

    Compute n as the product of two primes p and q: n=p×q. These two primes are very large and randomly selected primes.

  2. 2.

    Compute φ(n)=(p−1)(q−1).

  3. 3.

    Select e such that e is relatively prime to φ(n).

  4. 4.

    Select d such that e×d≡1 mod (φ(n), where stands for modular operation.

  5. 5.

    Choose (e, n) as the public key.

  6. 6.

    Choose (d, n) as the private key.

In encryption and decryption, receiver’s public key (e R , n R ) and private key (d R , n R ) are used. Encryption is carried out by using mod n R , where m is the plaintext and m c is the ciphertext. Decryption is carried out by using mod n R .

For authentication, sender’s public key (e s , n s ) and private key (d s , n s) are used. The signature is generated by using mjod n...

This is a preview of subscription content, log in via an institution.

References

  1. R.L. Rivest, A. Shamir, and L.M. Adleman, “A Method for Obtaining Digital Signature and Public-key Cryptosystems,” Communications of the ACM, Vol. 21, No. 2, pp. 120–126, 1978.

    CrossRef  MATH  MathSciNet  Google Scholar 

Download references

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer Science+Business Media, Inc.

About this entry

Cite this entry

(2006). The RSA Public-Key Encryption Algorithm. In: Furht, B. (eds) Encyclopedia of Multimedia. Springer, Boston, MA. https://doi.org/10.1007/0-387-30038-4_206

Download citation

Publish with us

Policies and ethics