1. DEPARTMENT OF MATHEMATICS & STATISTICS
Under the supervision of
Dr.R.K. Pandey
(Assistant professor)
Submitted by
Sourav Anand
Y24272025
(M.Sc 2 sem)
nd
RSA & DSA CRYPTOGRAPHY
3. Cryptography word came from Greek which is the combination of two word “Krypto” and “Graphene”
with meaning hidden writing
The art and science of sending secret information by concealing the message are first recognized
as cryptography.
CRYPTOGRAPHY
5. 04/15
TYPES OF CRYPTOGRAPHY
1. Symmetric key cryptography
symmetric key cryptosystems is also known as Private Key cryptosystem.
6. 05/15
TYPES OF CRYPTOGRAPHY
2. Assymetric key cryptography
Assymetric key cryptosystem is also know as public key cryptosystem.
Examples: RSA and DSA cryptography.
12. Before RSA, most encryption systems required the sender and receiver to share a private key in advance, which was impractical
over long distances or insecure networks.
In Symmetric encryption first we changes message into coded form then requires securely exchanging a secret key, which is difficult
and risky.
RSA introduced public key cryptography In RSA first we changes original message in integer then we encrypt message by the process
of encryption using public key and decrypt message by the process of decryption using private key .
The difficulty of factoring large prime numbers. The security of RSA is based on the fact that while multiplying two large prime
numbers is easy, factoring their product (a large composite number) is computationally infeasible for large key sizes.
MOTIVATION
13. INTRODUCTION
Named after its three public inventors: Ron Rivest, Adi Shamir and Leonard Adleman, RSA public key cryptosystem is the first invented public
key cryptosystem and one of the most commonly one in the world.
RSA cryptosystem allows the communicating parties to directly transmit the message safely in an insecure channel without sharing the
private keys beforehand.
The key which is used for encryption is called public key and The key which is used for decrpting a cipher text is called private. key. where its
security depends on the algorithm problem, instead of the secret pre-exchanged private keys.
18. why rsa cryptography is secure?
Because attackers will wants to know the value of ϕ(n) beacuse once they will know the value of
ϕ(n) then easily get the value of d.
Meanwhile finding the value of ϕ(n) attackers need (p−1) and (q−1) beacuse ϕ(n)=(p−1)
(q−1) and here p and q are two distinct large prime numbers.
21. Whenever we send any text messages images
videos
documents to others
no third
party knows your data
even whatapp also dont know.
each data
working on encryption decryption process.
Application of RSA
22. Application of RSA
you might be noticed that whenever you
payment by debit/credit card you share
all details
like CVV and also each detail still your card
not hacked
because meanwhile RSA works.
25. MOTIVATION
Paper signatures can be easily copied or changed and are not safe for
use on the internet.
As people began sharing important information online, there was a
need for a more secure way to sign documents.
The Digital Signature Algorithm (DSA) was developed to solve this
problem.
.
It checks if the message really came from the correct person and whether
it has been changed or not.
33. CONCLUSION
RSA algorithm can be applied to encrypt and decrypt messages using ASCII encoding, showing the
transformation from readable characters to cipher and back using modular exponentiation and also we
have analysed on the value of the exponent in the RSA algorithm.
If the value of exponent is high, the security of RSA algorithm also high. So, we proposed to implement the
high value of exponent in RSA algorithm to produce a better security.
Digital signature algorithms play acrucial role in ensuring the authenticity, integrity, and non-
repudiation of digital communications.
By cryptographic techniques, they provide a secureway to verify the identity of the sender and
confirm that the message has not beenaltered. As digital interactions become increasingly
prevalent, digital signature al-gorithms remain fundamental to building trust and security in
online transactionsand data exchange. heading