Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Cryptanalysis of RSA Factorization - Library(ISI Kolkata) - Indian ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
13 2.2 <strong>RSA</strong> Cryptosystem<br />
are implemented properly. In 2002, all three inventors <strong>of</strong> <strong>RSA</strong> received the Turing<br />
Award for their ingenious contribution for making public-key cryptography useful<br />
in practice. Let us systematically study the <strong>RSA</strong> cryptosystem before proceeding<br />
any further.<br />
2.2.1 Classical Model <strong>of</strong> <strong>RSA</strong><br />
In a public key cryptosystem, there exists three major components, namely the<br />
key generation process, and the algorithms for encryption and decryption. Key<br />
generation and decryption are performed by the recipient, whereas the encryption<br />
occurs on the side <strong>of</strong> the sender. In case <strong>of</strong> <strong>RSA</strong>, the three phases can be described<br />
as follows. We shall henceforth assume that Alice is the sender and Bob is the<br />
receiver in our cryptographic scheme.<br />
Key Generation<br />
To create a public/private key pair for the <strong>RSA</strong> cryptosystem, Bob first chooses<br />
randomly two ‘large’ primes p,q (recommended to use primes <strong>of</strong> same bitsize with<br />
minimum size <strong>of</strong> 512 each). Then he calculates the product N = pq and Euler’s<br />
totient function φ(N) = (p−1)(q −1). Bob keeps the values p,q,φ(N) secret, as<br />
any one who knows any one <strong>of</strong> these values will be able to decrypt messages sent<br />
to Bob.<br />
Bob’s next step is to find two positive integers e,d such that ed ≡ 1<br />
(mod φ(N)). Bob publishes the pair (e,N) as his public key, which can be used<br />
to encrypt messages meant for Bob. The pair (d,N) is Bob’s secret key and these<br />
are used to decrypt the received ciphertexts.<br />
Encryption<br />
To send a plaintext to Bob, Alice first transforms her message in to an element m<br />
<strong>of</strong> Z N , and calculates c ≡ m e (mod N). The ciphertext c is sent to Bob.<br />
Decryption<br />
After receiving the ciphertext c, Bob decrypts c by computing c d mod N and gets<br />
back m.