|
Cryptology
III.1 The RSA Cipher and its Algorithmic Foundations |
a7Hzq .#5r< kÜ\as TâÆK$ ûj(Ö2 ñw%h:
Úk{4R f~`z8 ¤˜Æ+Ô „&¢Dø |
|
Contents
- Description of the RSA cipher [PDF]
- The binary power algorithm [PDF]
- The CARMICHAEL function [PDF]
- Suitable parameters for RSA [PDF]
The complete Chapter III.1 as an PDF file
Overview
The most important—that is, most applied and most analyzed—asymmetric cipher
is RSA, named after its inventors Ron RIVEST, Adi SHAMIR, and Len ADLEMAN. It uses elementary
number theoretic algorithms, and its supposed security relies on the hardness of factoring
large numbers into primes, although breaking RSA might be easier then factoring, see Section 2.2.
The three fundamental arithmetic algorithms for implementing RSA are
- binary power algorithm,
- Euclidean algorithm,
- chinese remainder algorithm,
the last two of them known from Part I of these lectures (in the context of linear ciphers
as appendix of
Chapter 9).
These algorithms are basic not only for cryptography but more generally for algorithmic algebra
and number theory (»computer algebra«). Moreover they are fundamental also for numerical
mathematics—for problems that don't require approximate numerical solutions in
floating-point numbers but exact solutions in integers, rationals, or symbolic expressions.
Author: Klaus Pommerening, 2000-May-21;
last change: 2021-Feb-15