11.07.2014 Views

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

13 2.2 <strong>RSA</strong> Cryptosystem<br />

are implemented properly. In 2002, all three inventors <strong>of</strong> <strong>RSA</strong> received the Turing<br />

Award for their ingenious contribution for making public-key cryptography useful<br />

in practice. Let us systematically study the <strong>RSA</strong> cryptosystem before proceeding<br />

any further.<br />

2.2.1 Classical Model <strong>of</strong> <strong>RSA</strong><br />

In a public key cryptosystem, there exists three major components, namely the<br />

key generation process, and the algorithms for encryption and decryption. Key<br />

generation and decryption are performed by the recipient, whereas the encryption<br />

occurs on the side <strong>of</strong> the sender. In case <strong>of</strong> <strong>RSA</strong>, the three phases can be described<br />

as follows. We shall henceforth assume that Alice is the sender and Bob is the<br />

receiver in our cryptographic scheme.<br />

Key Generation<br />

To create a public/private key pair for the <strong>RSA</strong> cryptosystem, Bob first chooses<br />

randomly two ‘large’ primes p,q (recommended to use primes <strong>of</strong> same bitsize with<br />

minimum size <strong>of</strong> 512 each). Then he calculates the product N = pq and Euler’s<br />

totient function φ(N) = (p−1)(q −1). Bob keeps the values p,q,φ(N) secret, as<br />

any one who knows any one <strong>of</strong> these values will be able to decrypt messages sent<br />

to Bob.<br />

Bob’s next step is to find two positive integers e,d such that ed ≡ 1<br />

(mod φ(N)). Bob publishes the pair (e,N) as his public key, which can be used<br />

to encrypt messages meant for Bob. The pair (d,N) is Bob’s secret key and these<br />

are used to decrypt the received ciphertexts.<br />

Encryption<br />

To send a plaintext to Bob, Alice first transforms her message in to an element m<br />

<strong>of</strong> Z N , and calculates c ≡ m e (mod N). The ciphertext c is sent to Bob.<br />

Decryption<br />

After receiving the ciphertext c, Bob decrypts c by computing c d mod N and gets<br />

back m.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!