SlideShare a Scribd company logo
RSA Algorithm in Modular
Arithmetic
Discover the RSA algorithm, a
revolutionary method for secure
communication that relies on modular
arithmetic and prime numbers.
by Siddhanth Alape
Introduction to Cryptography and the RSA
Algorithm
Cryptography's Role
Cryptography ensures secure
communication by transforming
data into an unreadable format,
protecting sensitive information
from unauthorized access. RSA is a
widely used public-key
cryptosystem.
The RSA Algorithm
RSA is a powerful asymmetric
encryption algorithm. It relies on a
pair of keys - a public key for
encryption and a private key for
decryption.
Key Concepts: Prime Numbers,
Modular Arithmetic, Euler's
Totient Function
Prime Numbers
A prime number has only
two divisors: 1 and itself.
Prime numbers are crucial
for RSA's security.
Modular Arithmetic
Modular arithmetic deals
with remainders after
division. It forms the basis
of RSA's mathematical
operations.
Euler's Totient Function
Euler's Totient function counts the number of positive
integers less than a given integer that are relatively prime
to it. This function is key for generating RSA keys.
Generating Public and Private Keys
1 Choose two distinct large prime numbers, p and q.
2 Calculate the modulus n: n = p * q
3 Compute Euler's Totient function: φ(n) = (p - 1) * (q - 1)
4 Choose a public key exponent, e, that is relatively prime to φ(n) and 1 < e < φ
5 Calculate the private key exponent, d, such that: (e * d) mod φ(n) = 1
6 Public Key: (e, n)
7 Private Key: (d, n)
Encryption: Encoding a
Message using the Public
Key
Message
Transformation
Convert the message
into numerical
representation, typically
using ASCII encoding.
Public Key Application
Encrypt each numerical
block (m) of the message
using the public key: C =
m^e mod n
Ciphertext
The encrypted message
(C) is called the
ciphertext.
Decryption: Recovering
the Original Message
using the Private Key
Ciphertext Input
The ciphertext (C) is received by the intended
recipient.
Private Key Application
Decrypt each block of the ciphertext using
the private key: m = C^d mod n
Message Recovery
The original message (m) is recovered, revealing the
plaintext.
Example Calculations
and Walkthroughs
1
Key Generation
p = 17, q = 23, n = 391,
φ(n) = 336, e = 5, d = 281
2
Encryption
m = 88, C = 88^5 mod 391 = 269
3
Decryption
C = 269, m = 269^281 mod 391 = 88
Summary and
Applications of the RSA
Algorithm
RSA is a cornerstone of modern
cryptography, securing online
transactions, digital signatures, and data
privacy. Its strength lies in the
mathematical foundation of modular
arithmetic and prime factorization. RSA's
widespread use underscores its impact
on our digital world.

More Related Content

PDF
CRYPTOGRAPHY (2).pdf
PPTX
Public key algorithm
PPTX
RSA Algorithem and information about rsa
PDF
F010243136
PPT
PUBLIC KEY & RSA.ppt
PPT
Introduction to cryptography
PDF
RSA Algorithm report
PPT
CRYPTOGRAPHY (2).pdf
Public key algorithm
RSA Algorithem and information about rsa
F010243136
PUBLIC KEY & RSA.ppt
Introduction to cryptography
RSA Algorithm report

Similar to RSA-Algorithm-in-Modular-Arithmetic11 (1) (1).pptx (20)

PPT
RSA Algorithm.ppt
PPTX
RSA & MD5 algorithm
PPTX
Information and data security public key cryptography and rsa
PPT
Rsa rivest shamir adleman
PPTX
Rsa Crptosystem
PPTX
encryption and decryption ,and its types
PPTX
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
PPTX
Cryptography and network security
PPTX
Encryption and Decription of a Text Using Rivest-Shamir-Adleman Algorithm
PPTX
PPTX
Enhancing security in cloud storage
PDF
Presentation on Cryptography_Based on IEEE_Paper
DOC
PPTX
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
PPTX
Cryptography based chat system
PPTX
Unit 7 : Network Security
PDF
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
PDF
Ijetcas14 336
RSA Algorithm.ppt
RSA & MD5 algorithm
Information and data security public key cryptography and rsa
Rsa rivest shamir adleman
Rsa Crptosystem
encryption and decryption ,and its types
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Cryptography and network security
Encryption and Decription of a Text Using Rivest-Shamir-Adleman Algorithm
Enhancing security in cloud storage
Presentation on Cryptography_Based on IEEE_Paper
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Cryptography based chat system
Unit 7 : Network Security
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Ijetcas14 336
Ad

Recently uploaded (20)

PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PPTX
Introduction to Knowledge Engineering Part 1
PDF
Mega Projects Data Mega Projects Data
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PDF
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
PDF
Lecture1 pattern recognition............
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PDF
Clinical guidelines as a resource for EBP(1).pdf
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PPTX
Computer network topology notes for revision
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PDF
Foundation of Data Science unit number two notes
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PDF
Business Analytics and business intelligence.pdf
PDF
annual-report-2024-2025 original latest.
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPTX
Introduction to machine learning and Linear Models
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
Introduction to Knowledge Engineering Part 1
Mega Projects Data Mega Projects Data
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
Lecture1 pattern recognition............
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
Galatica Smart Energy Infrastructure Startup Pitch Deck
Clinical guidelines as a resource for EBP(1).pdf
Introduction-to-Cloud-ComputingFinal.pptx
Computer network topology notes for revision
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
Foundation of Data Science unit number two notes
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
Acceptance and paychological effects of mandatory extra coach I classes.pptx
Business Analytics and business intelligence.pdf
annual-report-2024-2025 original latest.
IBA_Chapter_11_Slides_Final_Accessible.pptx
Introduction to machine learning and Linear Models
Ad

RSA-Algorithm-in-Modular-Arithmetic11 (1) (1).pptx

  • 1. RSA Algorithm in Modular Arithmetic Discover the RSA algorithm, a revolutionary method for secure communication that relies on modular arithmetic and prime numbers. by Siddhanth Alape
  • 2. Introduction to Cryptography and the RSA Algorithm Cryptography's Role Cryptography ensures secure communication by transforming data into an unreadable format, protecting sensitive information from unauthorized access. RSA is a widely used public-key cryptosystem. The RSA Algorithm RSA is a powerful asymmetric encryption algorithm. It relies on a pair of keys - a public key for encryption and a private key for decryption.
  • 3. Key Concepts: Prime Numbers, Modular Arithmetic, Euler's Totient Function Prime Numbers A prime number has only two divisors: 1 and itself. Prime numbers are crucial for RSA's security. Modular Arithmetic Modular arithmetic deals with remainders after division. It forms the basis of RSA's mathematical operations. Euler's Totient Function Euler's Totient function counts the number of positive integers less than a given integer that are relatively prime to it. This function is key for generating RSA keys.
  • 4. Generating Public and Private Keys 1 Choose two distinct large prime numbers, p and q. 2 Calculate the modulus n: n = p * q 3 Compute Euler's Totient function: φ(n) = (p - 1) * (q - 1) 4 Choose a public key exponent, e, that is relatively prime to φ(n) and 1 < e < φ 5 Calculate the private key exponent, d, such that: (e * d) mod φ(n) = 1 6 Public Key: (e, n) 7 Private Key: (d, n)
  • 5. Encryption: Encoding a Message using the Public Key Message Transformation Convert the message into numerical representation, typically using ASCII encoding. Public Key Application Encrypt each numerical block (m) of the message using the public key: C = m^e mod n Ciphertext The encrypted message (C) is called the ciphertext.
  • 6. Decryption: Recovering the Original Message using the Private Key Ciphertext Input The ciphertext (C) is received by the intended recipient. Private Key Application Decrypt each block of the ciphertext using the private key: m = C^d mod n Message Recovery The original message (m) is recovered, revealing the plaintext.
  • 7. Example Calculations and Walkthroughs 1 Key Generation p = 17, q = 23, n = 391, φ(n) = 336, e = 5, d = 281 2 Encryption m = 88, C = 88^5 mod 391 = 269 3 Decryption C = 269, m = 269^281 mod 391 = 88
  • 8. Summary and Applications of the RSA Algorithm RSA is a cornerstone of modern cryptography, securing online transactions, digital signatures, and data privacy. Its strength lies in the mathematical foundation of modular arithmetic and prime factorization. RSA's widespread use underscores its impact on our digital world.