O'Reilly logo

Practical Cryptography by Al-Sakib Khan Pathan, Saiful Azad

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

8THE RSA ALGORITHM

SAAD ANDALIB AND SAIFUL AZAD

Contents

Keywords

8.1 The Concept

8.2 Operations

8.2.1 Key Generation

8.2.2 Encryption

8.2.3 Decryption

8.3 Applications of the RSA Algorithm

8.4 Implementation Code

Keywords

Asymmetric key algorithm

Private key

Public key

Public-key decryption

Public-key encryption

RSA

In mid-1977, 1 year after the introduction of public-key cryptography by Diffie and Hellman, three young scientists of the Massachusetts Institute of Technology (MIT) took the concept of public-key cryptography and developed an algorithm that is known as the RSA algorithm. It is named after the surnames of the three inventors, Ron Rivest, Adi Shamir, and Leonard Adleman. In RSA, a pair of keys is generated where one key is revealed ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required