SlideShare a Scribd company logo
The RSA Algorithm
Fundamental Theorem of Arithmetic
Presented By;
Antony P Saiji
S7 CSA ,Roll no:16
VJCET
Fundamental Theorem of Arithmetic
• Every Composite Number can be expressed (Factorized) as a product of
Prime Numbers, And these factorization is unique apart from the order in
which the Factor occur.
The RSA Algorithm
1 Select p,q
2 Calculate n= p xq
Ø(n)=(p-1) x(q-1)
3 Assume e : gcd(e, Ø(n))=1
4 Assume d : d ≡ e−1 (mod Ø (n))
or { d x e mod Ø (n) =1 }
5 Public Key = {e,n}
6 Private Key = {d,n}
p, q both large prime , p ≠ q
Primity Test –(Fermat Theorem)
Q(n) – Euler’s totient Function
1<e<Ø (n); e, Ø(n) Relatively Prime
• Encryption: Plaintext=M<n
Ciphertext , C =(Me)mod n
• Decryption:
Plaintext , M=(Ce)mod n
The RSA Algorithm
• An important requirement in a number of cryptographic algorithms is the
ability to choose a large prime number. An area of ongoing research is
the development of efficient algorithms for determining if a randomly
chosen large integer is a prime number.
• Its like Prime Numbers are the basic building block of a Number.
• Any integer a > 1 can be factored in a unique way as
where p1 < p2 < ... < pt are prime numbers and where each is a positive
integer.
This is known as thefundamental theorem of arithmetic
• 91 = 7 x 13
• 3600 = 24 x 32 x 52
• 11011 = 7 x 112 x 13
• If P is the set of all prime numbers, then any positive integer a can be
written uniquely in the following form:
• The right-hand side is the product over all possible prime numbers p; for any
particular value of a, most of the exponents ap will be 0.
• The value of any given positive integer can be specified by simply listing all
the nonzero exponents in the foregoing formulation.
• The integer 12 is represented by {a2 = 2, a3 = 1}.
• The integer 18 is represented by {a2 = 1, a3 = 2}.
• The integer 91 is represented by {a7 = 2, a13 = 1}.
• Multiplication of two numbers is equivalent to adding the corresponding
exponents.
• Define k = ab We know that the integer k can be expressed as the product
of powers of primes: . It follows that kp = ap + bp for all p e P.
• k = ab = 12 x 18 = (22 x 3) x (2 x 32) = 216
• k2 = 2 + 1 = 3; k3 = 1 + 2 = 3
• 216 = (23) x (33) = 8 x 27
What does it mean, in terms of the prime
factors of a and b, to say that a divides b?
• Any integer of the form can be divided only by an integer that is of a lesser or equal
power of the same prime number, with j <=n. Thus, we can say the following:
If a|b, then a_p b_p then for all p.
• a = 12; b = 36; 12|36
• 12 = 22 x 3 ; 36 = 22 x 32
• a2 = 2 = b2
• a3 = (1<= 2) = b3
• Thus, the inequality (a_p) <=(b_p) is satisfied for all prime numbers.
• It is easy to determine the Greatest Common Divisor of two positive
integers if we express each integer as the product of primes.
• 300 = (22 )x (31) x (52)
• 18 = (21) x (32)
• gcd(18,300) = (21) x (31) x (50) = 6
• The following relationship always holds:
If k = gcd(a,b) then kp = min(ap, bp) for all p

More Related Content

DOC
Rsa Algorithm
PDF
RSA ALGORITHM
PPTX
RSA-W7(rsa) d1-d2
PPTX
Eulers totient
PPT
Information and Network Security
PPTX
Implementation of RSA Algorithm for Speech Data Encryption and Decryption
PPT
Signyourd digital signature certificate provider
PPT
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Rsa Algorithm
RSA ALGORITHM
RSA-W7(rsa) d1-d2
Eulers totient
Information and Network Security
Implementation of RSA Algorithm for Speech Data Encryption and Decryption
Signyourd digital signature certificate provider
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio

What's hot (20)

PDF
Elliptic Curve Cryptography
PPTX
Al-Gamal-W6(al gamal)-d1-d2
PDF
Data Security Using Elliptic Curve Cryptography
PPTX
Homomorphic Encryption
PDF
Elliptic Curve Cryptography and Zero Knowledge Proof
DOCX
Number Theory In Cryptography
PPTX
Improved security system using steganography and elliptic curve crypto...
PDF
A survey on Fully Homomorphic Encryption
PDF
Introduction to Homomorphic Encryption
PDF
Understanding CTLE
PPTX
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
PPT
1524 elliptic curve cryptography
PPTX
Bch codes
PPTX
Information and data security other public key cryptosystems
PPSX
Prime numbers
PDF
Network security CS6
PDF
Network Security CS3-4
PPTX
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
Elliptic Curve Cryptography
Al-Gamal-W6(al gamal)-d1-d2
Data Security Using Elliptic Curve Cryptography
Homomorphic Encryption
Elliptic Curve Cryptography and Zero Knowledge Proof
Number Theory In Cryptography
Improved security system using steganography and elliptic curve crypto...
A survey on Fully Homomorphic Encryption
Introduction to Homomorphic Encryption
Understanding CTLE
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
1524 elliptic curve cryptography
Bch codes
Information and data security other public key cryptosystems
Prime numbers
Network security CS6
Network Security CS3-4
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
Ad

Similar to The RSA Algorithm (20)

PDF
11 Applied_Mathemathics HANDBOOK.pdf
PDF
Chapter 6
PPTX
Information and network security 34 primality
PPT
DOCX
Classical Encryption Techniques: Symmetric cipher model, Substitution techniq...
PPT
Set Of Primes Is Infinite - Number Theory
PPTX
Number theoryตัวจริง
PPTX
Number theoryตัวจริง
PPTX
Nbvtalkatbzaonencryptionpuzzles
PPTX
Nbvtalkatbzaonencryptionpuzzles
PPTX
It is about the number theory concept and integers
PDF
ncert-textbook-for-class-10-maths-chapter-1 (1).pdf
PPSX
Fundamental theorem of arithmatic
PPT
Iss lecture 3
PPT
ch08_cryptography_notes_by_william_stallings
PPT
Module - III.pptssssssssssssssssssssssssssssssssssssssssssssssss
PDF
Proof Techniques
PPT
Crptography and network security Number theory -
PDF
Advances in composite integer factorization
11 Applied_Mathemathics HANDBOOK.pdf
Chapter 6
Information and network security 34 primality
Classical Encryption Techniques: Symmetric cipher model, Substitution techniq...
Set Of Primes Is Infinite - Number Theory
Number theoryตัวจริง
Number theoryตัวจริง
Nbvtalkatbzaonencryptionpuzzles
Nbvtalkatbzaonencryptionpuzzles
It is about the number theory concept and integers
ncert-textbook-for-class-10-maths-chapter-1 (1).pdf
Fundamental theorem of arithmatic
Iss lecture 3
ch08_cryptography_notes_by_william_stallings
Module - III.pptssssssssssssssssssssssssssssssssssssssssssssssss
Proof Techniques
Crptography and network security Number theory -
Advances in composite integer factorization
Ad

Recently uploaded (20)

PPTX
Cell Types and Its function , kingdom of life
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Lesson notes of climatology university.
PDF
Classroom Observation Tools for Teachers
PDF
Complications of Minimal Access Surgery at WLH
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
RMMM.pdf make it easy to upload and study
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Institutional Correction lecture only . . .
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
Cell Types and Its function , kingdom of life
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Lesson notes of climatology university.
Classroom Observation Tools for Teachers
Complications of Minimal Access Surgery at WLH
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
VCE English Exam - Section C Student Revision Booklet
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
RMMM.pdf make it easy to upload and study
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Institutional Correction lecture only . . .
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Chinmaya Tiranga quiz Grand Finale.pdf
Final Presentation General Medicine 03-08-2024.pptx
Microbial diseases, their pathogenesis and prophylaxis
human mycosis Human fungal infections are called human mycosis..pptx

The RSA Algorithm

  • 1. The RSA Algorithm Fundamental Theorem of Arithmetic Presented By; Antony P Saiji S7 CSA ,Roll no:16 VJCET
  • 2. Fundamental Theorem of Arithmetic • Every Composite Number can be expressed (Factorized) as a product of Prime Numbers, And these factorization is unique apart from the order in which the Factor occur.
  • 3. The RSA Algorithm 1 Select p,q 2 Calculate n= p xq Ø(n)=(p-1) x(q-1) 3 Assume e : gcd(e, Ø(n))=1 4 Assume d : d ≡ e−1 (mod Ø (n)) or { d x e mod Ø (n) =1 } 5 Public Key = {e,n} 6 Private Key = {d,n} p, q both large prime , p ≠ q Primity Test –(Fermat Theorem) Q(n) – Euler’s totient Function 1<e<Ø (n); e, Ø(n) Relatively Prime • Encryption: Plaintext=M<n Ciphertext , C =(Me)mod n • Decryption: Plaintext , M=(Ce)mod n
  • 5. • An important requirement in a number of cryptographic algorithms is the ability to choose a large prime number. An area of ongoing research is the development of efficient algorithms for determining if a randomly chosen large integer is a prime number. • Its like Prime Numbers are the basic building block of a Number.
  • 6. • Any integer a > 1 can be factored in a unique way as where p1 < p2 < ... < pt are prime numbers and where each is a positive integer. This is known as thefundamental theorem of arithmetic • 91 = 7 x 13 • 3600 = 24 x 32 x 52 • 11011 = 7 x 112 x 13
  • 7. • If P is the set of all prime numbers, then any positive integer a can be written uniquely in the following form: • The right-hand side is the product over all possible prime numbers p; for any particular value of a, most of the exponents ap will be 0. • The value of any given positive integer can be specified by simply listing all the nonzero exponents in the foregoing formulation. • The integer 12 is represented by {a2 = 2, a3 = 1}. • The integer 18 is represented by {a2 = 1, a3 = 2}. • The integer 91 is represented by {a7 = 2, a13 = 1}.
  • 8. • Multiplication of two numbers is equivalent to adding the corresponding exponents. • Define k = ab We know that the integer k can be expressed as the product of powers of primes: . It follows that kp = ap + bp for all p e P. • k = ab = 12 x 18 = (22 x 3) x (2 x 32) = 216 • k2 = 2 + 1 = 3; k3 = 1 + 2 = 3 • 216 = (23) x (33) = 8 x 27
  • 9. What does it mean, in terms of the prime factors of a and b, to say that a divides b? • Any integer of the form can be divided only by an integer that is of a lesser or equal power of the same prime number, with j <=n. Thus, we can say the following: If a|b, then a_p b_p then for all p. • a = 12; b = 36; 12|36 • 12 = 22 x 3 ; 36 = 22 x 32 • a2 = 2 = b2 • a3 = (1<= 2) = b3 • Thus, the inequality (a_p) <=(b_p) is satisfied for all prime numbers.
  • 10. • It is easy to determine the Greatest Common Divisor of two positive integers if we express each integer as the product of primes. • 300 = (22 )x (31) x (52) • 18 = (21) x (32) • gcd(18,300) = (21) x (31) x (50) = 6 • The following relationship always holds: If k = gcd(a,b) then kp = min(ap, bp) for all p