SlideShare a Scribd company logo
Welcome to the
Presentation
1
Course Title:
Communications and
Network Security
Course Code: ICE450
Course Instructor:
Mohammad Rafsun Islam
Lecturer, ECE Dept. ,EWU
2
Presented by
1.Jannatun Nayeem
ID:2015-2-50-013
2.MD. Jahirul Islam Rabbi
ID:2015-2-50-010
3.Taslima Yasmin Tarin
ID: 2015-2-50-022
3
Presentation Topic:
Security Algorithm(RSA)
4
What is RSA ?
Cryptosystem for public-
key encryption
Securing data
Convert information
5
Inventor of RSA :
It named after Rivest-Shamir-
Adleman
6
Background
1977: Public-key encryption is
developed
1982: Found RSA Data Security
1994: RSA code is published on
Internet
 1999: Parent adopts the RSA name
7
How it works:
8
Distinction between DES
and RSA Algorithm’s
9
Social Impact
Secure Socket Layer (SSL)
• A public-key protocol
• Security layered
• Server authentication, message
integrity, client authentication
• Uses RSA public-key
cryptosystem
10
Authentication/Digital
signatures
• Pretty Good Privacy (PGP)
• Developed by Phil Zimmerman
• Provides encryption and
authentication
• Uses RSA for key transport
11
 Electronic money
• Electronic cash or digital
cash
• Transactions(debit or credit)
• Identity of the customer
• Blind signature schemes
12
 Anonymous remailers
• Carried out header
information
• Impossible to retrace
• The process
13
Practical Applications of the
RSAAlgorithm
 SSH (Secure Shell)
 SET protocol (Secure Electronic Transaction)
 Googles G Suite
 Digital data, info & telephone security
applications.
Advantages of RSA
 Fast encryption & verification
 Easier to implement than ECC
 Understand
 Widely deployed
 Safe and secure
 Hard to crack for factorization
 Easy to share the public key.
Disadvantages of RSA
 Slow key generation
 Slow decryption, tricky to
implement securely
 Two-part key is vulnerable to GCD
attack
 Slow for large data encrypted
 Verify the reliability of public
keys.
 Middlemen temper with the public
key system.
Conclusion
 DES is much faster than RSA. In software, DES is
generally at least 100 times as fast as RSA. coming
years, as there are growing commercial markets, but
DES will get faster as well.
Any Question?
18
THANK YOU!
19

More Related Content

PDF
OTechs Logging System (syslog-ng) Training Course
PPTX
CISSP with Net Security Training
PDF
Week13 presentation
PDF
Silabus Keamanan Sistem Komputer
PDF
Looking for a ICT Security function within ICT and looking for an employer th...
PPTX
Cybersecurity Careers: Setting Yourself Apart in a Competitive Field
PDF
2nd ICANN APAC-TWNIC Engagement Forum: What is Hitting my Honeypots?
OTechs Logging System (syslog-ng) Training Course
CISSP with Net Security Training
Week13 presentation
Silabus Keamanan Sistem Komputer
Looking for a ICT Security function within ICT and looking for an employer th...
Cybersecurity Careers: Setting Yourself Apart in a Competitive Field
2nd ICANN APAC-TWNIC Engagement Forum: What is Hitting my Honeypots?

Similar to RSA algorithem (20)

PPTX
Data security using rsa
PPTX
RSA Algorithem and information about rsa
PPT
Digital Signature Recognition using RSA Algorithm
PPT
Rsa rivest shamir adleman
PPTX
Cyber_--Security_Presentation_FIXED.pptx
PPTX
Cyber Security PowerPoint Templates (1).pptx
PPTX
A NETWORK SECURITY APPROACH USING RSA.
PPT
PUBLIC KEY & RSA.ppt
PPTX
Encryption and Decription of a Text Using Rivest-Shamir-Adleman Algorithm
PPTX
RSA Algorithm
PPT
RSA Algorithm - Public Key Cryptography
PPTX
Rsa Crptosystem
PPTX
RSA Algm.pptx
PPT
PPT
Public key cryptography and RSA algorithm
PDF
MAT255_Final_Paper_RSA_Encryption
PPT
Unit --3.ppt
PDF
Ch34508510
Data security using rsa
RSA Algorithem and information about rsa
Digital Signature Recognition using RSA Algorithm
Rsa rivest shamir adleman
Cyber_--Security_Presentation_FIXED.pptx
Cyber Security PowerPoint Templates (1).pptx
A NETWORK SECURITY APPROACH USING RSA.
PUBLIC KEY & RSA.ppt
Encryption and Decription of a Text Using Rivest-Shamir-Adleman Algorithm
RSA Algorithm
RSA Algorithm - Public Key Cryptography
Rsa Crptosystem
RSA Algm.pptx
Public key cryptography and RSA algorithm
MAT255_Final_Paper_RSA_Encryption
Unit --3.ppt
Ch34508510
Ad

More from Taslima Yasmin Tarin (15)

PDF
Restaurant management system
PPTX
Mobile Satellite Communication
PPTX
Application of DSP in Biomedical science
PPTX
Real Life Application of Digital Electronics
PPTX
GPS (Global Positioning System) application
DOCX
Artificial intelligence chatbot Report
PPTX
AI chatbot for massenger
DOCX
file compression/zip file.report
PPTX
file compression ,zip file
DOCX
PPTX
farakka barrage
PPT
PPTX
Operation Amplifire
Restaurant management system
Mobile Satellite Communication
Application of DSP in Biomedical science
Real Life Application of Digital Electronics
GPS (Global Positioning System) application
Artificial intelligence chatbot Report
AI chatbot for massenger
file compression/zip file.report
file compression ,zip file
farakka barrage
Operation Amplifire
Ad

Recently uploaded (20)

PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Sustainable Sites - Green Building Construction
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
composite construction of structures.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Well-logging-methods_new................
PPT
Project quality management in manufacturing
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Welding lecture in detail for understanding
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Mechanical Engineering MATERIALS Selection
Sustainable Sites - Green Building Construction
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
composite construction of structures.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
CYBER-CRIMES AND SECURITY A guide to understanding
Well-logging-methods_new................
Project quality management in manufacturing
Internet of Things (IOT) - A guide to understanding
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Welding lecture in detail for understanding
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Model Code of Practice - Construction Work - 21102022 .pdf
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf

RSA algorithem