Definition:The RSA is one of the popular public-key encryption algorithms.
Rivest et al published a method for obtaining digital signatures and public-key cryptosystems in 1978 [1]. In order to use the method, the encryption and decryption keys must be chosen as follows:
- 1.
Compute n as the product of two primes p and q: n=p×q. These two primes are very large and randomly selected primes.
- 2.
Compute φ(n)=(p−1)(q−1).
- 3.
Select e such that e is relatively prime to φ(n).
- 4.
Select d such that e×d≡1 mod (φ(n), where stands for modular operation.
- 5.
Choose (e, n) as the public key.
- 6.
Choose (d, n) as the private key.
In encryption and decryption, receiver’s public key (e R , n R ) and private key (d R , n R ) are used. Encryption is carried out by using
mod n R , where m is the plaintext and m c is the ciphertext. Decryption is carried out by using
mod n R .
For authentication, sender’s public key (e s , n s ) and private key (d s , n s) are used. The signature is generated by using
mjod n...
This is a preview of subscription content, log in via an institution.
References
R.L. Rivest, A. Shamir, and L.M. Adleman, “A Method for Obtaining Digital Signature and Public-key Cryptosystems,” Communications of the ACM, Vol. 21, No. 2, pp. 120–126, 1978.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, Inc.
About this entry
Cite this entry
(2006). The RSA Public-Key Encryption Algorithm. In: Furht, B. (eds) Encyclopedia of Multimedia. Springer, Boston, MA. https://doi.org/10.1007/0-387-30038-4_206
Download citation
DOI: https://doi.org/10.1007/0-387-30038-4_206
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-24395-5
Online ISBN: 978-0-387-30038-2
eBook Packages: Computer ScienceReference Module Computer Science and Engineering
