22-09-2014, 10:45 AM
THE RSA CRYPTOSYSTEM
THE RSA.pdf (Size: 492.59 KB / Downloads: 278)
ABSTRACT
The RSA cryptosystem is a part of Cryptography. Cryptography is derived from a Greek word which means hidden secret and is practiced to secure the data from third party. More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, data authentication and data availability. The ancient cryptography just meant the encryption of the data while the modern cryptography follows a strongly scientific approach, and designs cryptographic algorithms around computational hardness assumptions, making such algorithms hard to break by an adversary. In order to prevent some unwanted users or people to get access to the data cryptography is needed. Cryptography saves the data from the actions like interruption, interception and data modification. This process is followed by RSA algorithm, hash functions and many more. This algorithm is based on the difficulty of factorizing large numbers that have 2 and only 2 factors (Prime numbers). The system works on a public and private key system. The public key is made available to everyone. With this key a user can encrypt data but cannot decrypt it, the only person who can decrypt it is the one who possesses the private key. It is theoretically possible but extremely difficult to generate the private key from the public key, this makes the RSA algorithm a very popular choice in data encryption. The RSA algorithm is the most widely implemented public key cryptosystem worldwide.
DATA
Data can be defined as a representation of facts, concepts or instructions in a formalized manner, which should be suitable for communication, interpretation or processing by human or electronic machine.
Data is a set of values of qualitative or quantitative variables; restated, data are individual pieces of information. Data in computing or data processing are represented in a structure that is often tabular (represented by rows and columns), a tree (a set of nodes with parent-children relationship), or a graph (a set of connected nodes). Data are typically the results of measurements and can be visualized using graphs or images.
Raw data i.e., unprocessed data, refers to a collection of numbers, characters and is a relative term; data processing commonly occurs by stages, and the "processed data" from one stage may be considered the "raw data" of the next. Field data refers to raw data that is collected in an uncontrolled in situ environment. Experimental data refers to data that is generated within the context of a scientific investigation by observation and recording.
The word data is the traditional plural form of datum, which is originally a Latin noun meaning “something given”. Data as an abstract concept can be viewed as the lowest level of abstraction, from which information and then knowledge are derived. It is generally the facts and statistics collected together for reference or analysis.
CRYPTOGRAPHY
Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). Cryptography is an important part of preventing private data from being stolen. Even if an attacker were to break into your computer or intercept your messages they still will not be able to read the data if it is protected by cryptography or encrypted. More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation.
Cryptography can be used to authenticate that the sender of a message is the actual sender and not an imposter. Encryption also provides for repudiation, which is similar to authentication, and is used to prove that someone actually sent a message or performed an action. For, instance it can used to prove a criminal performed a specific financial transaction.
Cryptography ensures confidentiality because only a reader with the correct deciphering algorithm or key can read the encrypted message. Finally, Cryptography can protect the integrity of information by ensuring that messages have not been altered.
Cryptography comes from Greek words meaning “hidden writing”. There are, in general, three types of cryptographic schemes typically used to accomplish these goals: secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography. In all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into cipher text, which will in turn (usually) be decrypted into usable plaintext.
CONCLUSION
Encryption and decryption for authorized users are fast. RSA is computationally feasible. RSA is a strong encryption algorithm that has stood a partial test of time. RSA implements a public-key cryptosystem that allows secure communications and digital signatures", and its security rests in part on the difficulty of factoring large numbers. The authors urged anyone to attempt to break their code, whether by factorization techniques or otherwise, and nobody to date seems to have succeeded. This has in effect certified RSA, and will continue to assure its security for as long as it stands the test of time against such break-ins.