The security of rsa depends on the fact that it takes

Info iconThis preview shows pages 4–5. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: The security of RSA depends on the fact that it takes an impractical amount of time to factor large numbers two large prime numbers (a prime number is a number divisible only by that number and 1) and through additional operations deriving a set of two numbers that constitutes the public key and another set that is the private key . Once the keys have been developed, the original prime numbers are no longer important and can be discarded. Both the public and the private keys are needed for encryption /decryption but only the owner of a private key ever needs to know it. Using the RSA system, the private key never needs to be sent across the Internet. The private key is used to decrypt text that has been encrypted with the public key. Thus, if I send you a message, I can find out your public key (but not your private key) from a central administrator and encrypt a message to you using your public key. When you receive it, you decrypt it with your private key. In addition to encrypting messages (which ensures privacy), you can authenticate yourself to me (so I know that it is really you who sent the message) by using your private key to encrypt a digital certificate . When I receive it, I can use your public key to decrypt it. A table might help us remember this....
View Full Document

{[ snackBarMessage ]}

Page4 / 5

The security of RSA depends on the fact that it takes an...

This preview shows document pages 4 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online