SlideShare a Scribd company logo
RSAAlgorithm
By: Dr. Kapil Gupta
1
CONTENTS
• Symmetric Encryption
• Symmetric Cipher Model
• Asymmetric Encryption
• Asymmetric Cipher Model
• RSAAlgorithm
2
Symmetric Encryption
• Conventional / Private-key / Single-key
• sender and recipient share a common key
• all classical encryption algorithms are private-
key
• was only type prior to invention of public-key
in 1970’s
• most widely used
3
• Conventional Encryption: encryption and
decryption are performed using the same key.
• Symmetric encryption transforms plaintext
into ciphertext using a secret key and an
encryption algorithm.
• Using the same key and a decryption
algorithm, the plaintext is recovered from the
ciphertext.
4
Symmetric Cipher Model
5
Asymmetric Encryption
• public-key/two-key/asymmetric cryptography
involves the use of two keys:
– a public-key, which may be known by anybody, and can be
used to encrypt messages, and verify signatures
– a private-key, known only to the recipient, used to decrypt
messages, and sign (create) signatures
• why asymmetric ?
– those who encrypt messages or verify signatures cannot
decrypt messages or create signatures
6
Asymmetric Cipher Model
7
• RSA (Rivest–Shamir–Adleman) is one of the first public-key
cryptosystems and is widely used for secure data transmission.
• In such a cryptosystem, the encryption key is public and
distinct from the decryption key which is kept secret (private).
• In RSA, this asymmetry is based on the practical difficulty
of factoring the product of two large prime numbers, the
"factoring problem".
• The RSA algorithm is the most popular and proven
asymmetric key cryptographic algorithm.
• The RSA algorithm is based on the mathematical fact that
it is easy to find and multiply large prime numbers
together, but it is extremely difficult to factor their
product.
RSAAlgorithm
8
• The real challenge in the case of RSA is the selection and
generation of the public and private keys.
• Let us now understand how the public and private keys are
generated, using them, how we can perform encryption and
decryption in RSA.
9
EXAMPLE:
10
11
12
REFERENCES
1. Cryptography and Network Security by
Atul Kahate.
2. Cryptography and Network Security by
William Stallings.
13
Thank You
14

More Related Content

PPSX
5 Cryptography Part1
PPTX
Cryptography
PPT
Network Security
PPT
PPTX
Cryptography and network security
PPTX
Network security
PDF
Types of Cryptosystem and Cryptographic Attack
5 Cryptography Part1
Cryptography
Network Security
Cryptography and network security
Network security
Types of Cryptosystem and Cryptographic Attack

What's hot (20)

PDF
CNS - Unit - 4 - Public Key Cryptosystem
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPT
Cryptography and Network Security
PPTX
cryptography
PDF
Cryptography in Python
PPT
Cryptography Intro
PDF
Information Security Cryptography ( L02- Types Cryptography)
PPTX
Cryptographic tools
 
PPTX
Encryption algorithms
PDF
CNS - Unit - 1 - Introduction
PDF
Encryption and Key Distribution Methods
PPT
Ch11 Basic Cryptography
PPTX
Cryptography and Encryptions,Network Security,Caesar Cipher
PPTX
Cissp d5-cryptography v2012-mini coursev2
PPTX
Cryptography and network security Nit701
PPT
Network Security and Cryptography
PDF
Ch 12: Cryptography
PPT
Network security cryptography ppt
PDF
18CS2005 Cryptography and Network Security
PPTX
Basic cryptography
CNS - Unit - 4 - Public Key Cryptosystem
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Cryptography and Network Security
cryptography
Cryptography in Python
Cryptography Intro
Information Security Cryptography ( L02- Types Cryptography)
Cryptographic tools
 
Encryption algorithms
CNS - Unit - 1 - Introduction
Encryption and Key Distribution Methods
Ch11 Basic Cryptography
Cryptography and Encryptions,Network Security,Caesar Cipher
Cissp d5-cryptography v2012-mini coursev2
Cryptography and network security Nit701
Network Security and Cryptography
Ch 12: Cryptography
Network security cryptography ppt
18CS2005 Cryptography and Network Security
Basic cryptography
Ad

Similar to RSA Algoritmn (20)

PPTX
Lec # 7 Symmetric and asymmetric cryptography.pptx
PPTX
Information and network security 31 public key cryptography
PDF
Cryptology - The practice and study of hiding information
PPTX
Security - ch3.pptx
PPTX
PPTX
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
PPTX
Lecture 5 - Cryptography.pptx
PPTX
Security - ch3.pptx
PPTX
Detailed description about the concept of E Commerce UNIT IV.pptx
PPTX
Introduction to cryptography part1-final
PPTX
Information and network security 10 classical encryption techniques
PDF
Basic Cryptography.pdf
PPTX
Encryption techniques
PDF
Information Security 05- Encryption.pdfn
PPT
Cryptography cse,ru
PPT
cryptography deepan fav subject
PPTX
Encrytion ppt
PPTX
information security(Public key encryption its characteristics and weakness, ...
PPTX
asymmetric encryption.pptx
PPTX
big data and Iot , its security part ,hoe yoy help this
Lec # 7 Symmetric and asymmetric cryptography.pptx
Information and network security 31 public key cryptography
Cryptology - The practice and study of hiding information
Security - ch3.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
Lecture 5 - Cryptography.pptx
Security - ch3.pptx
Detailed description about the concept of E Commerce UNIT IV.pptx
Introduction to cryptography part1-final
Information and network security 10 classical encryption techniques
Basic Cryptography.pdf
Encryption techniques
Information Security 05- Encryption.pdfn
Cryptography cse,ru
cryptography deepan fav subject
Encrytion ppt
information security(Public key encryption its characteristics and weakness, ...
asymmetric encryption.pptx
big data and Iot , its security part ,hoe yoy help this
Ad

More from Dr. Kapil Gupta (7)

PDF
Research Methodology & IPR-I
PDF
Research Methodology & IPR-II
PDF
Current mirror-A constant current circuit
PDF
Multimedia communication jpeg
PPTX
Sampling theorem
PPTX
Symmetric Encryption Techniques
PDF
Chapter 1 Introduction of Cryptography and Network security
Research Methodology & IPR-I
Research Methodology & IPR-II
Current mirror-A constant current circuit
Multimedia communication jpeg
Sampling theorem
Symmetric Encryption Techniques
Chapter 1 Introduction of Cryptography and Network security

Recently uploaded (20)

PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Current and future trends in Computer Vision.pptx
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
OOP with Java - Java Introduction (Basics)
PPT
Project quality management in manufacturing
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Geodesy 1.pptx...............................................
PDF
737-MAX_SRG.pdf student reference guides
bas. eng. economics group 4 presentation 1.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
R24 SURVEYING LAB MANUAL for civil enggi
Current and future trends in Computer Vision.pptx
Safety Seminar civil to be ensured for safe working.
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Foundation to blockchain - A guide to Blockchain Tech
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
OOP with Java - Java Introduction (Basics)
Project quality management in manufacturing
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
CYBER-CRIMES AND SECURITY A guide to understanding
Automation-in-Manufacturing-Chapter-Introduction.pdf
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
CH1 Production IntroductoryConcepts.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Embodied AI: Ushering in the Next Era of Intelligent Systems
Geodesy 1.pptx...............................................
737-MAX_SRG.pdf student reference guides

RSA Algoritmn

  • 2. CONTENTS • Symmetric Encryption • Symmetric Cipher Model • Asymmetric Encryption • Asymmetric Cipher Model • RSAAlgorithm 2
  • 3. Symmetric Encryption • Conventional / Private-key / Single-key • sender and recipient share a common key • all classical encryption algorithms are private- key • was only type prior to invention of public-key in 1970’s • most widely used 3
  • 4. • Conventional Encryption: encryption and decryption are performed using the same key. • Symmetric encryption transforms plaintext into ciphertext using a secret key and an encryption algorithm. • Using the same key and a decryption algorithm, the plaintext is recovered from the ciphertext. 4
  • 6. Asymmetric Encryption • public-key/two-key/asymmetric cryptography involves the use of two keys: – a public-key, which may be known by anybody, and can be used to encrypt messages, and verify signatures – a private-key, known only to the recipient, used to decrypt messages, and sign (create) signatures • why asymmetric ? – those who encrypt messages or verify signatures cannot decrypt messages or create signatures 6
  • 8. • RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission. • In such a cryptosystem, the encryption key is public and distinct from the decryption key which is kept secret (private). • In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the "factoring problem". • The RSA algorithm is the most popular and proven asymmetric key cryptographic algorithm. • The RSA algorithm is based on the mathematical fact that it is easy to find and multiply large prime numbers together, but it is extremely difficult to factor their product. RSAAlgorithm 8
  • 9. • The real challenge in the case of RSA is the selection and generation of the public and private keys. • Let us now understand how the public and private keys are generated, using them, how we can perform encryption and decryption in RSA. 9
  • 11. 11
  • 12. 12
  • 13. REFERENCES 1. Cryptography and Network Security by Atul Kahate. 2. Cryptography and Network Security by William Stallings. 13