SlideShare a Scribd company logo
2
Most read
4
Most read
10
Most read
1
RSAAlgorithm is the first public key algorithm
discovered by a group of three scientists namely Ron
Rivest,Adi Shamir and Len Adleman and was first
published in 1978.
*
RSAAlgorithm is based on the original work of
Diffie.
*
It uses the key for encryption is different from (but
related to ) the key used for decryption.
*
The RSA algorithm can be used for both public key
encryption and digital signature purposes.*
3
* The Keys used for encryption and decryption in RSA
algorithm, are generated using random data ( 300-400
digit). The key used for encryption is a public key and
the key used for decryption is a private key.
Public keys are stored anywhere publicly accessible.
The sender of message encrypt the data using the
receiver's public key, and the receiver decrypt it
using its own private key. That’s why, no one else
can intercept the data except receiver.
*
Continue..
4
Select the two largest random prime number P
and Q to calculate the key.
STEP -1
A prime number is a natural number greater than 1
that has no positive divisors other than 1 and itself.
Example:- 2,3,5,7,11,13,…………. etc
5
STEP -2
Calculate the system modulus –N of P and Q which is a
common number for both public and private keys.
N = P *Q
STEP -3
Calculate Encryption key(E) as
Find factors of (P-1)*(Q-1)
 Choose E such that E should not divided by any
factor of (P-1)*(Q-1)
6
STEP -4
Calculate decryption key (D) such that
(E * D) mod (P-1)(Q-1) = 1
(P-1)(Q-1) * K + 1 = value1, value2,…..
Where k = 1,2,3,……
7
Encryption
STEP-5
CT=PT E Mod N
STEP-6
Decryption
PT=CT D Mod N
8
Consider RSA algorithm Where P and Q are 17 and 11
respectively find E and D
P=17
Q=11
Step-1
Calculate N
N=P x Q
N=17 x 11
N=187
9
Step-2
Calculate encryption key(E)
Find factorial of (P-1)(Q-1)
=(17-1) (11-1)
=(16) (10)
=2 x 2 x 2 x 2 x 2 x 5
Now We choose E such that E should not divided by
any factor of (P-1) x (Q-1)
10
Choose
E=3
Step-3
=> E x D mod (P-1)(Q-1)=1
=> E x D mod 160 =1
=> 3 x D mod 160 =1
160 x k + 1 , 160 x k + 1
161 , 321
=> 3 x D = 321
=> D=321/3
=> D=107
Continue..
11
12

More Related Content

PPTX
RSA Algorithm
PPTX
RSA algorithm
PPTX
RSA ALGORITHM
PPTX
Cryptography.ppt
PPTX
Elliptic Curve Cryptography
PDF
Vtu network security(10 ec832) unit 3 notes.
PPTX
Diffie hellman key exchange algorithm
PPT
Classical Encryption Techniques
RSA Algorithm
RSA algorithm
RSA ALGORITHM
Cryptography.ppt
Elliptic Curve Cryptography
Vtu network security(10 ec832) unit 3 notes.
Diffie hellman key exchange algorithm
Classical Encryption Techniques

What's hot (20)

PDF
Computer Security Lecture 7: RSA
PPT
Diffiehellman
PPTX
Trible data encryption standard (3DES)
PPTX
Public Key Cryptography
PPTX
Asymmetric Cryptography.pptx
PPT
Data encryption standard
PPT
The rsa algorithm
PPT
PPTX
Cryptography
PDF
RSA ALGORITHM
PPTX
Public Key Cryptosystem
PPTX
Cryptography and network security Nit701
PDF
Elliptic curve cryptography
PDF
Classical encryption techniques
PPT
DES (Data Encryption Standard) pressentation
PPT
Network security cryptographic hash function
PPTX
Kerberos
PPT
Network Security and Cryptography
PPTX
Idea(international data encryption algorithm)
PPTX
Elgamal digital signature
Computer Security Lecture 7: RSA
Diffiehellman
Trible data encryption standard (3DES)
Public Key Cryptography
Asymmetric Cryptography.pptx
Data encryption standard
The rsa algorithm
Cryptography
RSA ALGORITHM
Public Key Cryptosystem
Cryptography and network security Nit701
Elliptic curve cryptography
Classical encryption techniques
DES (Data Encryption Standard) pressentation
Network security cryptographic hash function
Kerberos
Network Security and Cryptography
Idea(international data encryption algorithm)
Elgamal digital signature
Ad

Viewers also liked (20)

PPTX
Rsa Crptosystem
PPTX
Cryptography - Simplified - Key Generation - Asymmetric Keys
PPTX
Cryptography using rsa cryptosystem
PPTX
Cryptography.ppt
PPTX
1. Evidencia CONCEPTOS GENERALES DE DIVERSIDAD CULTURAL E INTERCULTURALIDAD
PPT
Cryptography its history application and beyond
PPTX
Biometrics based key generation
PPTX
RSA криптосистем
PPT
Reverse Engineering Android Application
PPTX
PPTX
ContikiMAC : Radio Duty Cycling Protocol
PPT
Ch31
PDF
Information Security Cryptography ( L02- Types Cryptography)
PPTX
Intro to modern cryptography
PPT
EULER AND FERMAT THEOREM
PDF
Modern Cryptography
PPTX
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
PPTX
Public Key Algorithms
PPTX
Apprenticeship artifact
PDF
Data Encryption and Decryption using Hill Cipher
Rsa Crptosystem
Cryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography using rsa cryptosystem
Cryptography.ppt
1. Evidencia CONCEPTOS GENERALES DE DIVERSIDAD CULTURAL E INTERCULTURALIDAD
Cryptography its history application and beyond
Biometrics based key generation
RSA криптосистем
Reverse Engineering Android Application
ContikiMAC : Radio Duty Cycling Protocol
Ch31
Information Security Cryptography ( L02- Types Cryptography)
Intro to modern cryptography
EULER AND FERMAT THEOREM
Modern Cryptography
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
Public Key Algorithms
Apprenticeship artifact
Data Encryption and Decryption using Hill Cipher
Ad

Similar to Rsa algorithm key generation (20)

PPTX
Public key algorithm
PPTX
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
PPT
PUBLIC KEY & RSA.ppt
PPT
RSA Algorithm - Public Key Cryptography
PPTX
RSA Algm.pptx
PDF
PPT
Rsa diffi-network security-itt
PDF
CRYPTOGRAPHY (2).pdf
PPTX
3 public key cryptography
PDF
Public-Key Cryptography.pdfWrite the result of the following operation with t...
PPTX
RSA Encryption presentation for Education.pptx
PPTX
Information and network security 33 rsa algorithm
PDF
RSA 32-bit Implementation Technique
PDF
international security system data threats
PDF
PRINCIPLES OF INFORMATION SYSTEM SECURITY
PPT
PPTX
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Public key algorithm
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
PUBLIC KEY & RSA.ppt
RSA Algorithm - Public Key Cryptography
RSA Algm.pptx
Rsa diffi-network security-itt
CRYPTOGRAPHY (2).pdf
3 public key cryptography
Public-Key Cryptography.pdfWrite the result of the following operation with t...
RSA Encryption presentation for Education.pptx
Information and network security 33 rsa algorithm
RSA 32-bit Implementation Technique
international security system data threats
PRINCIPLES OF INFORMATION SYSTEM SECURITY
Unit-III_3R-CRYPTO_2021-22_VSM.pptx

Recently uploaded (20)

PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Open folder Downloads.pdf yes yes ges yes
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
UNDER FIVE CLINICS OR WELL BABY CLINICS.pptx
PPTX
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
PDF
Basic Mud Logging Guide for educational purpose
PDF
Electrolyte Disturbances and Fluid Management A clinical and physiological ap...
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
01-Introduction-to-Information-Management.pdf
PDF
Insiders guide to clinical Medicine.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Anesthesia in Laparoscopic Surgery in India
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
TR - Agricultural Crops Production NC III.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Open folder Downloads.pdf yes yes ges yes
Microbial diseases, their pathogenesis and prophylaxis
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?
UNDER FIVE CLINICS OR WELL BABY CLINICS.pptx
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
Basic Mud Logging Guide for educational purpose
Electrolyte Disturbances and Fluid Management A clinical and physiological ap...
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
O7-L3 Supply Chain Operations - ICLT Program
01-Introduction-to-Information-Management.pdf
Insiders guide to clinical Medicine.pdf

Rsa algorithm key generation

  • 1. 1
  • 2. RSAAlgorithm is the first public key algorithm discovered by a group of three scientists namely Ron Rivest,Adi Shamir and Len Adleman and was first published in 1978. * RSAAlgorithm is based on the original work of Diffie. * It uses the key for encryption is different from (but related to ) the key used for decryption. * The RSA algorithm can be used for both public key encryption and digital signature purposes.*
  • 3. 3
  • 4. * The Keys used for encryption and decryption in RSA algorithm, are generated using random data ( 300-400 digit). The key used for encryption is a public key and the key used for decryption is a private key. Public keys are stored anywhere publicly accessible. The sender of message encrypt the data using the receiver's public key, and the receiver decrypt it using its own private key. That’s why, no one else can intercept the data except receiver. * Continue.. 4
  • 5. Select the two largest random prime number P and Q to calculate the key. STEP -1 A prime number is a natural number greater than 1 that has no positive divisors other than 1 and itself. Example:- 2,3,5,7,11,13,…………. etc 5
  • 6. STEP -2 Calculate the system modulus –N of P and Q which is a common number for both public and private keys. N = P *Q STEP -3 Calculate Encryption key(E) as Find factors of (P-1)*(Q-1)  Choose E such that E should not divided by any factor of (P-1)*(Q-1) 6
  • 7. STEP -4 Calculate decryption key (D) such that (E * D) mod (P-1)(Q-1) = 1 (P-1)(Q-1) * K + 1 = value1, value2,….. Where k = 1,2,3,…… 7
  • 8. Encryption STEP-5 CT=PT E Mod N STEP-6 Decryption PT=CT D Mod N 8
  • 9. Consider RSA algorithm Where P and Q are 17 and 11 respectively find E and D P=17 Q=11 Step-1 Calculate N N=P x Q N=17 x 11 N=187 9
  • 10. Step-2 Calculate encryption key(E) Find factorial of (P-1)(Q-1) =(17-1) (11-1) =(16) (10) =2 x 2 x 2 x 2 x 2 x 5 Now We choose E such that E should not divided by any factor of (P-1) x (Q-1) 10
  • 11. Choose E=3 Step-3 => E x D mod (P-1)(Q-1)=1 => E x D mod 160 =1 => 3 x D mod 160 =1 160 x k + 1 , 160 x k + 1 161 , 321 => 3 x D = 321 => D=321/3 => D=107 Continue.. 11
  • 12. 12