# Research papers on rsa algorithm

Open n, ekeep n, d.

### Strength and weakness of rsa algorithm

Although, the transformation of encryption and decryption is the inverse, the private key system handles the data as a bit, but the public key system handles the data as a number that perform function operation and the mathematical function is one-way. Also introduces in the process of implementation of RSA algorithm in Visual Studios environment and operation results. How to ensure the security of information in the course of transmission have become the most important things for people at present. In order to protect the information in the transmission process, prevent important or private information is intercepted and steal. The algorithm is based on large integers and prime testing; its mathematical basis is the Euler theorem. The verification process is to get hash value H1 of M1 using the HASH function and get the H2 from the decrypt digital signature of C1 by using the public key. Using this system for encryption and decryption of information, theoretically, good results were obtained in safety and reliability. Cryptographic techniques are used to ensure the confidentiality, integrity and authenticity of electronic data. Not only has it to ensure the information confidential, but also provides digital signature, authentication, secret sub-storage, system security and other functions. Even if the access by third parties, not decrypt the corresponding method, the information has no value in use, it will not cause any loss. Encryption and decryption algorithm's security depends on the algorithm while the internal structure of the rigor of mathematics, it also depends on the key confidentiality. Encryption description: The encryption algorithm is divided into two kinds, symmetric and asymmetric encryption.

The specific process is as follows as shown in Fig. Using symmetric encryption, the two parties communicate with the common key that needing the only one. Even if the access by third parties, not decrypt the corresponding method, the information has no value in use, it will not cause any loss.

Nearly forty years, has experienced all kinds of attacks and the test, has been gradually accepted by the people and is considered to be one of the best public key schemes. Regardless of the sender or receiver of encryption and decryption use the key.

The algorithm of the model is shown in Fig. This study mainly introduces the application of RSA algorithm in encryption and decryption, mentions the technology of digital signature.

Not only has it to ensure the information confidential, but also provides digital signature, authentication, secret sub-storage, system security and other functions. Party A can only decrypt any information that encrypt by its public-key by a dedicated key.

### Research papers on rsa algorithm

In addition, the encrypt procedure and code implementation is provided in details. Maybe I take a shot at it, and maybe I break it. The algorithm of the model is shown in Fig. Party A can only decrypt any information that encrypt by its public-key by a dedicated key. Simple process is shown in Fig. Resources and Help Research and implementation of RSA algorithm for encryption and decryption Abstract: Cryptographic technique is one of the principal means to protect information security. Using symmetric encryption, the two parties communicate with the common key that needing the only one. The specific process is as follows as shown in Fig. Exchange the key of the symmetric encryption algorithm Chen and Zhu, : Because of asymmetric encryption algorithm is t more slowly than symmetric encryption algorithm, so asymmetric encryption algorithm is usually used to secure encryption key of the symmetric encryption algorithm in the practice, but symmetric encryption algorithm is usually used to secure the Communication of message. Compare H1 to H2 is the same Shi et al.

The verification process is to get hash value H1 of M1 using the HASH function and get the H2 from the decrypt digital signature of C1 by using the public key. Key in the encryption algorithm has a pivotal position, once the key was leaked, it means that anyone can be in the encryption system to encrypt and decrypt information, it means the encryption algorithm is useless.

Exchange the key of the symmetric encryption algorithm Chen and Zhu, : Because of asymmetric encryption algorithm is t more slowly than symmetric encryption algorithm, so asymmetric encryption algorithm is usually used to secure encryption key of the symmetric encryption algorithm in the practice, but symmetric encryption algorithm is usually used to secure the Communication of message.

Resources and Help Research and implementation of RSA algorithm for encryption and decryption Abstract: Cryptographic technique is one of the principal means to protect information security.

Rated 7/10
based on 28 review

Download