SlideShare a Scribd company logo
DEPARTMENT OF MATHEMATICS & STATISTICS
Under the supervision of
Dr.R.K. Pandey
(Assistant professor)
Submitted by
Sourav Anand
Y24272025
(M.Sc 2 sem)
nd
RSA & DSA CRYPTOGRAPHY
CONTENTS
CONTENTS
CONTENTS
Introduction of cryptography
RSA Cryptography
DSA cryptography
Latest trends of cryptography
Refrences
Cryptography word came from Greek which is the combination of two word “Krypto” and “Graphene”
with meaning hidden writing
The art and science of sending secret information by concealing the message are first recognized
as cryptography.
CRYPTOGRAPHY
TYPES OF CRYPTOGRAPHY
04/15
TYPES OF CRYPTOGRAPHY
1. Symmetric key cryptography
symmetric key cryptosystems is also known as Private Key cryptosystem.
05/15
TYPES OF CRYPTOGRAPHY
2. Assymetric key cryptography
Assymetric key cryptosystem is also know as public key cryptosystem.
Examples: RSA and DSA cryptography.
GOALS OF CRYPTOGRAPHY
1. RSA
2. DSA
3. Both RSA AND DSA
4. Only RSA
Q. which of the option is public cryptography?
1. RSA
2. DSA
3. Both RSA AND DSA
4. Only RSA
Q. which of the option is public cryptography?
Answer:Both Rsa and DSA
RSA CRYPTOGRAPHY
CONTENTS
CONTENTS
CONTENTS
Motivation
Introduction
Model of RSA
Application of RSA
Why RSA cryptography is secure ?
Python Implementation of RSA
Algorithm of RSA & Examples Conclusion
Before RSA, most encryption systems required the sender and receiver to share a private key in advance, which was impractical
over long distances or insecure networks.
In Symmetric encryption first we changes message into coded form then requires securely exchanging a secret key, which is difficult
and risky.
RSA introduced public key cryptography In RSA first we changes original message in integer then we encrypt message by the process
of encryption using public key and decrypt message by the process of decryption using private key .
The difficulty of factoring large prime numbers. The security of RSA is based on the fact that while multiplying two large prime
numbers is easy, factoring their product (a large composite number) is computationally infeasible for large key sizes.
MOTIVATION
INTRODUCTION
Named after its three public inventors: Ron Rivest, Adi Shamir and Leonard Adleman, RSA public key cryptosystem is the first invented public
key cryptosystem and one of the most commonly one in the world.
RSA cryptosystem allows the communicating parties to directly transmit the message safely in an insecure channel without sharing the
private keys beforehand.
The key which is used for encryption is called public key and The key which is used for decrpting a cipher text is called private. key. where its
security depends on the algorithm problem, instead of the secret pre-exchanged private keys.
MODEL OF RSA
ALGORITHM OF RSA
Encryption process:
Decryption process:
Key generation steps:
Example of RSA algorithm
Encryption process:
Decryption process:
Example of rsa algorithm
why rsa cryptography is secure?
Because attackers will wants to know the value of ϕ(n) beacuse once they will know the value of
ϕ(n) then easily get the value of d.
Meanwhile finding the value of ϕ(n) attackers need (p−1) and (q−1) beacuse ϕ(n)=(p−1)
(q−1) and here p and q are two distinct large prime numbers.
Python Implementation of RSA
Python Implementation of RSA
Output of python implementation:
Whenever we send any text messages images
videos
documents to others
no third
party knows your data
even whatapp also dont know.
each data
working on encryption decryption process.
Application of RSA
Application of RSA
you might be noticed that whenever you
payment by debit/credit card you share
all details
like CVV and also each detail still your card
not hacked
because meanwhile RSA works.
DSA CRYPTOGRAPHY
Conclusion
CONTENTS
CONTENTS
CONTENTS
Motivation
Introduction
Model of DSA
Application of DSA
Why DSA cryptography is secure ?
Algorithm of DSA
MOTIVATION
Paper signatures can be easily copied or changed and are not safe for
use on the internet.
As people began sharing important information online, there was a
need for a more secure way to sign documents.
The Digital Signature Algorithm (DSA) was developed to solve this
problem.
.
It checks if the message really came from the correct person and whether
it has been changed or not.
INTRODUCTION
INTRODUCTION
MODEL OF DSA
ALGORITHM OF DSA
ALGORITHM OF DSA
Signature Generation:
ALGORITHM OF DSA
Signature Verification:
Application of DSA
CONCLUSION
RSA algorithm can be applied to encrypt and decrypt messages using ASCII encoding, showing the
transformation from readable characters to cipher and back using modular exponentiation and also we
have analysed on the value of the exponent in the RSA algorithm.
If the value of exponent is high, the security of RSA algorithm also high. So, we proposed to implement the
high value of exponent in RSA algorithm to produce a better security.
Digital signature algorithms play acrucial role in ensuring the authenticity, integrity, and non-
repudiation of digital communications.
By cryptographic techniques, they provide a secureway to verify the identity of the sender and
confirm that the message has not beenaltered. As digital interactions become increasingly
prevalent, digital signature al-gorithms remain fundamental to building trust and security in
online transactionsand data exchange. heading
Quantum Cryptography
Blockchain
Bitcoin
Cryptocurrency
Post quantum Cryptography
Homomorphic Encryption
Lightweight Cryptography
LATEST TRENDS OF CRYPTOGRAPHY
THANK
YOU!
+91-8507382329
souravanand329@gmail.com

More Related Content

PPTX
Data security using rsa
PPTX
Rsa Crptosystem
PDF
State of the art parallel approaches for
PDF
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
PDF
Data Security With Colors Using Rsa
PPT
Introduction To PKI Technology
PDF
RSA Cryptosystem using Python
PPT
Digital Signature Recognition using RSA Algorithm
Data security using rsa
Rsa Crptosystem
State of the art parallel approaches for
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
Data Security With Colors Using Rsa
Introduction To PKI Technology
RSA Cryptosystem using Python
Digital Signature Recognition using RSA Algorithm

Similar to ALGORITHM OF RSA AND DSA CRYPTOGRAPHY.pdf (20)

PDF
Review on variants of Security aware AODV
PPTX
RSA Algorithem and information about rsa
PPTX
cryptography and network security
PPTX
Basic Cryptography unit 4 CSS
PPTX
A NETWORK SECURITY APPROACH USING RSA.
PDF
Image Cryptography using RSA Algorithm
PPT
Final ss2-digital-signature-group5
PDF
A Literature Review of Some Modern RSA Variants
PPTX
Rsa algorithm (rivest shamir-adleman)
PPT
Secure Socket Layer (SSL)
PPTX
PPTX
Unit 7 : Network Security
PDF
Give a clear explanation of RSA cryptography and why it works.So.pdf
PDF
Data encryption algorithm(edit)
PPTX
LEARN CRYPTOGRAPHY: What do they use? Series 2 of 3
PDF
Answer questions 11-15 with a short paragraph of 5-9 lines.11.Publ.pdf
PDF
Ch34508510
PDF
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
PDF
CRYPTOGRAPHY (2).pdf
Review on variants of Security aware AODV
RSA Algorithem and information about rsa
cryptography and network security
Basic Cryptography unit 4 CSS
A NETWORK SECURITY APPROACH USING RSA.
Image Cryptography using RSA Algorithm
Final ss2-digital-signature-group5
A Literature Review of Some Modern RSA Variants
Rsa algorithm (rivest shamir-adleman)
Secure Socket Layer (SSL)
Unit 7 : Network Security
Give a clear explanation of RSA cryptography and why it works.So.pdf
Data encryption algorithm(edit)
LEARN CRYPTOGRAPHY: What do they use? Series 2 of 3
Answer questions 11-15 with a short paragraph of 5-9 lines.11.Publ.pdf
Ch34508510
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
CRYPTOGRAPHY (2).pdf
Ad

Recently uploaded (20)

PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
GDM (1) (1).pptx small presentation for students
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Lesson notes of climatology university.
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Microbial disease of the cardiovascular and lymphatic systems
Final Presentation General Medicine 03-08-2024.pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
GDM (1) (1).pptx small presentation for students
STATICS OF THE RIGID BODIES Hibbelers.pdf
Cell Structure & Organelles in detailed.
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Cell Types and Its function , kingdom of life
Abdominal Access Techniques with Prof. Dr. R K Mishra
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
2.FourierTransform-ShortQuestionswithAnswers.pdf
Sports Quiz easy sports quiz sports quiz
O5-L3 Freight Transport Ops (International) V1.pdf
Insiders guide to clinical Medicine.pdf
RMMM.pdf make it easy to upload and study
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Lesson notes of climatology university.
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Ad

ALGORITHM OF RSA AND DSA CRYPTOGRAPHY.pdf

  • 1. DEPARTMENT OF MATHEMATICS & STATISTICS Under the supervision of Dr.R.K. Pandey (Assistant professor) Submitted by Sourav Anand Y24272025 (M.Sc 2 sem) nd RSA & DSA CRYPTOGRAPHY
  • 2. CONTENTS CONTENTS CONTENTS Introduction of cryptography RSA Cryptography DSA cryptography Latest trends of cryptography Refrences
  • 3. Cryptography word came from Greek which is the combination of two word “Krypto” and “Graphene” with meaning hidden writing The art and science of sending secret information by concealing the message are first recognized as cryptography. CRYPTOGRAPHY
  • 5. 04/15 TYPES OF CRYPTOGRAPHY 1. Symmetric key cryptography symmetric key cryptosystems is also known as Private Key cryptosystem.
  • 6. 05/15 TYPES OF CRYPTOGRAPHY 2. Assymetric key cryptography Assymetric key cryptosystem is also know as public key cryptosystem. Examples: RSA and DSA cryptography.
  • 8. 1. RSA 2. DSA 3. Both RSA AND DSA 4. Only RSA Q. which of the option is public cryptography?
  • 9. 1. RSA 2. DSA 3. Both RSA AND DSA 4. Only RSA Q. which of the option is public cryptography? Answer:Both Rsa and DSA
  • 11. CONTENTS CONTENTS CONTENTS Motivation Introduction Model of RSA Application of RSA Why RSA cryptography is secure ? Python Implementation of RSA Algorithm of RSA & Examples Conclusion
  • 12. Before RSA, most encryption systems required the sender and receiver to share a private key in advance, which was impractical over long distances or insecure networks. In Symmetric encryption first we changes message into coded form then requires securely exchanging a secret key, which is difficult and risky. RSA introduced public key cryptography In RSA first we changes original message in integer then we encrypt message by the process of encryption using public key and decrypt message by the process of decryption using private key . The difficulty of factoring large prime numbers. The security of RSA is based on the fact that while multiplying two large prime numbers is easy, factoring their product (a large composite number) is computationally infeasible for large key sizes. MOTIVATION
  • 13. INTRODUCTION Named after its three public inventors: Ron Rivest, Adi Shamir and Leonard Adleman, RSA public key cryptosystem is the first invented public key cryptosystem and one of the most commonly one in the world. RSA cryptosystem allows the communicating parties to directly transmit the message safely in an insecure channel without sharing the private keys beforehand. The key which is used for encryption is called public key and The key which is used for decrpting a cipher text is called private. key. where its security depends on the algorithm problem, instead of the secret pre-exchanged private keys.
  • 15. ALGORITHM OF RSA Encryption process: Decryption process: Key generation steps:
  • 16. Example of RSA algorithm Encryption process: Decryption process:
  • 17. Example of rsa algorithm
  • 18. why rsa cryptography is secure? Because attackers will wants to know the value of ϕ(n) beacuse once they will know the value of ϕ(n) then easily get the value of d. Meanwhile finding the value of ϕ(n) attackers need (p−1) and (q−1) beacuse ϕ(n)=(p−1) (q−1) and here p and q are two distinct large prime numbers.
  • 20. Python Implementation of RSA Output of python implementation:
  • 21. Whenever we send any text messages images videos documents to others no third party knows your data even whatapp also dont know. each data working on encryption decryption process. Application of RSA
  • 22. Application of RSA you might be noticed that whenever you payment by debit/credit card you share all details like CVV and also each detail still your card not hacked because meanwhile RSA works.
  • 24. Conclusion CONTENTS CONTENTS CONTENTS Motivation Introduction Model of DSA Application of DSA Why DSA cryptography is secure ? Algorithm of DSA
  • 25. MOTIVATION Paper signatures can be easily copied or changed and are not safe for use on the internet. As people began sharing important information online, there was a need for a more secure way to sign documents. The Digital Signature Algorithm (DSA) was developed to solve this problem. . It checks if the message really came from the correct person and whether it has been changed or not.
  • 31. ALGORITHM OF DSA Signature Verification:
  • 33. CONCLUSION RSA algorithm can be applied to encrypt and decrypt messages using ASCII encoding, showing the transformation from readable characters to cipher and back using modular exponentiation and also we have analysed on the value of the exponent in the RSA algorithm. If the value of exponent is high, the security of RSA algorithm also high. So, we proposed to implement the high value of exponent in RSA algorithm to produce a better security. Digital signature algorithms play acrucial role in ensuring the authenticity, integrity, and non- repudiation of digital communications. By cryptographic techniques, they provide a secureway to verify the identity of the sender and confirm that the message has not beenaltered. As digital interactions become increasingly prevalent, digital signature al-gorithms remain fundamental to building trust and security in online transactionsand data exchange. heading
  • 34. Quantum Cryptography Blockchain Bitcoin Cryptocurrency Post quantum Cryptography Homomorphic Encryption Lightweight Cryptography LATEST TRENDS OF CRYPTOGRAPHY