In *Encyclopedia of Multimedia*, pages 770–770. Springer US, 2008. 00000

Paper abstract bibtex

Paper abstract bibtex

DefinitionThe RSA is one of the popular public-key encryption algorithms.Rivest et al. published a method for obtaining digital signatures and public-key cryptosystems in 1978 [1]. In order to use the method, the encryption and decryption keys must be chosen as follows:1.Compute n as the product of two primes p and q: n = p × q. These two primes are very large and randomly selected primes. 2.Compute ϕ (n) = (p−1)(q−1). 3.Select e such that e is relatively prime to ϕ (n). 4.Select d such that e × d ≡ 1 mod (ϕ (n)), where stands for modular operation. 5.Choose (e, n) as the public key. 6.Choose (d, n) as the private key. In encryption and decryption, receiver's public key (eR, nR) and private key (dR, nR) are used. Encryption is carried out by using mc−meRmc−meRm_c - m\textasciicircum\e_R \ mod nR, where m is the plaintext and mc is the ciphertext. Decryption is carried out by using m=(mc)dRm=(mc)dRm = \textbackslashleft( \m_c \ \textbackslashright)\textasciicircum\\textasciicircum\d_R \ \ mod nR.For authentication, sender's public key (es, ns) and private key (d ...

@incollection{furht_rsa_2008, title = {{RSA} {Public}-{Key} {Encryption} {Algorithm}}, copyright = {©2008 Springer-Verlag}, isbn = {978-0-387-74724-8 978-0-387-78414-4}, url = {http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_198}, abstract = {DefinitionThe RSA is one of the popular public-key encryption algorithms.Rivest et al. published a method for obtaining digital signatures and public-key cryptosystems in 1978 [1]. In order to use the method, the encryption and decryption keys must be chosen as follows:1.Compute n as the product of two primes p and q: n = p × q. These two primes are very large and randomly selected primes. 2.Compute ϕ (n) = (p−1)(q−1). 3.Select e such that e is relatively prime to ϕ (n). 4.Select d such that e × d ≡ 1 mod (ϕ (n)), where stands for modular operation. 5.Choose (e, n) as the public key. 6.Choose (d, n) as the private key. In encryption and decryption, receiver's public key (eR, nR) and private key (dR, nR) are used. Encryption is carried out by using mc−meRmc−meRm\_c - m{\textasciicircum}\{e\_R \} mod nR, where m is the plaintext and mc is the ciphertext. Decryption is carried out by using m=(mc)dRm=(mc)dRm = {\textbackslash}left( \{m\_c \} {\textbackslash}right){\textasciicircum}\{{\textasciicircum}\{d\_R \} \} mod nR.For authentication, sender's public key (es, ns) and private key (d ...}, language = {en}, urldate = {2016-05-03}, booktitle = {Encyclopedia of {Multimedia}}, publisher = {Springer US}, editor = {Furht, Borko}, year = {2008}, note = {00000}, pages = {770--770} }

Downloads: 0