887 Words4 Pages

The RSA procedure is different from other encryption decryption procedure because it have two different keys for encryption and decryption. The RSA algorithm is an asymmetric encryption algorithm. In 1978 Ron Rivest, Adi Shamir, and Leonard Adleman introduced this encryption method. It is an asymmetric method because it has a public key and a private key. We will see two aspects of the RSA cryptosystem, firstly generation of key pair and secondly encryption-decryption algorithms.[5]
Generation of RSA Key Pair : Each person or a party who desires to participate in communication using encryption needs to generate a pair of keys, namely public key and private key. The process followed in the generation of keys is described below −
Generate the*…show more content…*

In a secret-key system, by contrast, the secret keys must be transmitted (either manually or through a communication channel) since the same key is used for encryption and decryption. A serious concern is that there may be a chance that an enemy can discover the secret key during transmission.[6] Another advantage is if any person try to decrypt the message it is quite impossible to break the encryption during his life time. There are some limitations of RSA public key cryptography also. Fake public-key algorithms. The user should not worry if public key leak, but need to consider someone takes another's place by counterfeiting published false public key, so it should be possible to widely publish the right key to public to prevent counterfeiting. The RSA security depends on the difficulty of factoring large numbers, but is equivalent to factoring has not been proved theoretically, because there is no proof of cracked RSA will need factorization. If there is an algorithm can fast decompose a large number, so the RSA algorithm's security would be threatened. In addition, the computational ability of the computer to continuously improve, the cost of computer to reduce, the parallel technology of the computer to develop, then attack the RSA algorithm will get huge growth ability. The RSA encryption and decryption algorithm need a lot of calculation and the speed is slowly. [7] Complexity of the key creation. Because of the RSA algorithm is limited by the prime and efficiency of generating primes is relatively low, so it is difficult to achieve a secret

In a secret-key system, by contrast, the secret keys must be transmitted (either manually or through a communication channel) since the same key is used for encryption and decryption. A serious concern is that there may be a chance that an enemy can discover the secret key during transmission.[6] Another advantage is if any person try to decrypt the message it is quite impossible to break the encryption during his life time. There are some limitations of RSA public key cryptography also. Fake public-key algorithms. The user should not worry if public key leak, but need to consider someone takes another's place by counterfeiting published false public key, so it should be possible to widely publish the right key to public to prevent counterfeiting. The RSA security depends on the difficulty of factoring large numbers, but is equivalent to factoring has not been proved theoretically, because there is no proof of cracked RSA will need factorization. If there is an algorithm can fast decompose a large number, so the RSA algorithm's security would be threatened. In addition, the computational ability of the computer to continuously improve, the cost of computer to reduce, the parallel technology of the computer to develop, then attack the RSA algorithm will get huge growth ability. The RSA encryption and decryption algorithm need a lot of calculation and the speed is slowly. [7] Complexity of the key creation. Because of the RSA algorithm is limited by the prime and efficiency of generating primes is relatively low, so it is difficult to achieve a secret

Related

## Disadvantages Of Asymmetric Encryption

1538 Words | 7 Pagesdistribution. The public key encryption uses two keys in the encryption and decryption process, which is stronger and less likely to be breakthroughs, but it is slower than traditional encryption. As a result of these advantages and disadvantages it has become modern systems using both methods, where they use the traditional method of encryption and the exchange of a single secret key between the multicast parties carried out through the use of public key encryption method....[2] 4. Digital certificates:

## Eec 584 Phase 1 Report

1148 Words | 5 Pagesnetwork secutity, there are several problems that can be addressed such as integrity, data secrecy, digital signature problems and authentication. To provide a significant protection for the data,a well-established security control is Encryption. On the basis of this encryption, we would like to propose a digital signature authentication technique. In this paper, we are trying to solve the problem by considering a scheme which is shared secretly with digital signature protocols and authentication. For the

## Importance Of Cryptography

10475 Words | 42 PagesCHAPTER 1 INTRODUCTION 1.1 Cryptography The word cryptography is derived from the Greek words Cryptos meaning cover and grafia meaning writing [1] defining it as covered writing. In image cryptography the information is hidden exclusively in images. Cryptography is the art and science of secret communication .It is the practice of encoding/embedding secret information in a manner such that the existence of the information is invisible. The original files can be referred to as cover text, cover image

## The Enigma Machine: The Turing Bombe

1034 Words | 5 PagesThe so called Enigma machine, a electro-mechanical encryption machine developed by Arthur Sherbius at the end of the previous world war, made use of a substitution cypher. What made it almost impossible to crack was the fact that a mechanism inside the machine changed the substitution alphabet after every single letter. Its use on the other hand was very easy: the plaintext had to be typed on the keyboard of the machine to produce the ciphertext. If the recipient of the message entered the ciphertext

### Disadvantages Of Asymmetric Encryption

1538 Words | 7 Pages### Eec 584 Phase 1 Report

1148 Words | 5 Pages### Importance Of Cryptography

10475 Words | 42 Pages### The Enigma Machine: The Turing Bombe

1034 Words | 5 Pages