Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)
Tags: algorithm, full, report, rsa algorithm, rsa algorithm ppt, rsa algorithm pdf, rsa algorithm technology, rsa algorithm in c, rsa algorithm in java, rsa algorithm ppt, rsa algorithm example, rsa algorithm with example, rsa algorithm cryptography, rsa algorithm pdf, rsa algorithm code, rsa algorithm tutorial,
Ask More Info Of  A Seminar Ask More Info Of A Project Post Reply  Follow us on Twitter
24-01-2010, 10:11 PM
Post: #1
rsa algorithm full report

.doc  rsa algorithm full report.doc (Size: 54.5 KB / Downloads: 415)

INTRODUCTION
RSA Algorithm was discovered by a group of three scientists namely Ron Rivest,Adi Shamir and Len Adleman and was first published in 1978.
The RSA scheme is a block cipher in which the plain text and cipher text are integers between 0 and n-1 for some n.
A Typical size of n is 1024 bits or 309 decimal digits.
This is a public key encryption scheme.
In this scheme two pairs of integers {e, n} and {d, n} are used. First of them i.e. {e.n} is called the RSA public key and the other one i.e. {d, n} is called the RSA secret key.
The sender uses the public key and encrypts the message say M into cipher text as “
C = M^e mod n.
Where C is the cipher text and M is the message or the plane text
At the receiving end the receiver accept the cipher text C and decrypt the C into M using secret key {d, n}-

M = C^d mod n.
Example:
Let , e=3, d=7, n=33.
Suppose the message is ËœSUNâ„¢ and we use the numeric values of the characters according to their serial in alphabets.
Plaintext Ciphertext© after decryption
Sym num M^3 M^3 mod33 C^7 C^7mod33 sym
S 19 6859 28 13492928512 19 S
U 21 9261 21 1801088541 21 U
N 14 2744 5 78125 14 N

KEY GENERATION
The process of Key Generation contain the following steps
1- Select two prime numbers say p and q randomly
Where p q.
2- Calculate-
n = p *q.
3- Calculate Ø(n) = (p-1) (q-1)
Note-
What is Ø(n)
Ø(n) is called the Euler™s Totient function.
It is the no. of positive integers that are relative prime to n and are less then n.
For example: - to determine Ø(35), we list all the positive integers less then 35 that are relatively prime to it:
1,2,3,4,6,8,9,11,12,13,16,17,18,19,22,23,24,26,27,29,31, 32,33,34.
There are 24 no on the list , so Ø(35) =24.
One thing which is important is that the value of Ø(1) is without meaning but is defined to have the value 1.
¢ It should be clear that for a prime no p ,
Ø(p) = p-1.
Now suppose that we have two prime no p and q , with p does not equal to q .Then for n = pq
Ø (n) = Ø (pq) = Ø (p)* Ø (q) = (p-1)*(q-1).
Two integers are said to be relatively prime if there only common positive integer factor is one.
4- Select any integer e such that gcd (Ø(n),e)=1;
1 < e < Ø (n).
Note:-
Gcd means greatest common divisor. The gcd of any two positive integers can be calculated with the help of Euclid™s algorithm which is as under “
EUCLID (a, b)
1. A a; B b
2. if B=0 return A = gcd (a, b)
3. R = A mod B
4. A B
5. B R
6. goto 2
5- calculate the value of d “
de = 1 mod Ø(n) or
d = e^-1 mod Ø(n)
In calculation of ˜d™ we need the multiplicative inverse of ˜e™ modulo Ø(n) .
We know that if gcd (m, b)=1, then b has a multiplicative inverse modulo m. That is, for positive integer b<m, there exists a b^-1 such that bb^-1=1mod m. Euclidâ„¢s algorithm can be extended so that, in addition to find gcd(m, b), if gcd is 1,the algorithm returns the multiplicative inverse of b. The extended Euclidâ„¢s algorithm is as under-
EXTENDED EUCLID (m, b)
1. (A1, A2, A3) (1, 0, m); (B1, B2, B3) (0, 1, B)
2. if B3=0 return A3 = gcd (m, b); no inverse
3. if B3=1 return B3 = gcd (m, b); B2 = b^-1 mod m
4. Q=+A3/B3+
5. (T1, T2, T3) (A1-QB1, A2-QB2, A3-QB3)
6. (A1, A2, A3)(B1, B2, B3)
7. (B1, B2, B3) (T1, T2, T3 )
8. Goto 2.
Throughout the computation, the following relationship hold:
mT1+bT2=T3 mA1+bA2=A3 mB1+bB2=B3
To see that this algorithm correctly runs gcd(m, b), note that if equate A and B in Euclidâ„¢s algorithm with A3 and B3 in the extended Euclidâ„¢s algorithm , then the treatment of two variables is identical. At each iteration of Euclidâ„¢s algorithm, A is set equal to the previous value of B and B is set equal to the value of A mod B.
similarly, at each step of extended Euclidâ„¢s algorithm,A3 is set equal to the previous value of B3,and B3 is set equal to the previous value of A3 minus the integer quotient of A3/B3 multiplied by B3.This latter value is simply the remainder of A3 divided by B3, which is A3mod B3.
Note also that if gcd (m, b) =1, then on the final step we would have B3=0 and A3 =1. Therefore, on the preceding step, B3 =1. But B3 =1, then we can say the following:

mB1+bB2=B3
mB1+bB2=1
bB2=1-mB1
bB2= 1mod m
And B2 is the multiplicative inverse of b, modulo m.
6. Public key of RSA is {e, n}
7. Private key of RSA is {d, n}
Encryption Algorithm:
Let, the message is M.
Where the M<n.
Ciphertext “
C=M^e mod n.
Decryption Algorithm:

If the ciphertext is C, then the original message or the plaintext-
M=C^d mod n.

In encryption and decryption algorithms, we have to compute M^e and C^d respectively. This can be accomplished by an algorithm that can compute
a^b (mod n) and is given below-
c0; d1
for i k downto 0
do c 2*c
d (d*d) mod n
if bi =1
then c c+1
d (d*a) mod n
return d
The above algorithm computes a^ b mod n.
Where k- the no of bits in binary representation of the number Ëœbâ„¢ .
It means that first we convert the decimal number Ëœbâ„¢Into binary number say bk bk-1..............b0 , and apply the above algorithm.
APPLICATIONS
¢ RSA is widely used for encryption and decryption in message communication for making the communication secure.
¢ It is used for digital signature.
¢ It is used for key distribution.
¢ RSA is used in e-commerce and remote banking.
Conclusion
After the study, I find that RSA is a powerful and most widely used scheme for encryption / decryption and digital signature. It is more secure than that of DES and others. But as we know that the key length for secure RSA use has increased over recent years, and this has put a heavier processing load on applications using RSA. This burden has ramifications, especially for electronic commerce sites that conduct large numbers of transactions.
Recently, a competing system has begun to challenge RSA: elliptic curve cryptography (ECC).
The principal attraction of ECC, compared to RSA, is that it appears to offer equal security for a far smaller key size; thereby reducing processing overhead but the confidence level in ECC is not yet as high as that is in RSA. Also RSA is fundamentally easier to explain than that of ECC.

Please Use Search http://seminarprojects.com/search.php wisely To Get More Information About A Seminar Or Project Topic
14-10-2010, 12:57 PM
Post: #2
RE: rsa algorithm full report

.rar  RSA-Cryptosystem.rar (Size: 306.03 KB / Downloads: 159)
The RSA Cryptosystem

Orhan K AKYILDIZ
COMP5703 - Advanced Algorithms
oka[at]kayra.ca

Abstract
In this seminar report, we review public key cryptography, and RSA
public cyryptosystem in particular.
RSA public cryptosystem is a asymmetrical cryptosystem: it uses a
pair of keys, one of which is used to encrypt the data in such a way that
it can only be decrypted with the other key. The keys are generated
by a common process, but they can not be feasably generated from each
other. The relation between these keys relies on a NP-hard problem: in
virtually all cases, the function is a one-way function. There are a number
of such one-way functions that various cryptographic algorithms rely on,
including integer factorization, discrete logarithm, etc.
1 Introduction
A cryptosystem is a sytem that allows secure exchange of information over an
insecure channel [2],[3].
A crypto-system is typically modelled as a three-party system in which, a
sender (historically called `Alice' ) sends a message to a recipient (`Bob' ) over
an insecure channel, in the existance of an adversary (Eve), who tries to extract
information o , or potentially change, the message. Figure 1 on page 3 depicts
basic elements of a symmetric cryptosystem. Figure 2 on page 3 represents a
newer class of cryptosystems, called asymmetric cryptosystems.
A crypto-system is symmetrical when both encryption (the E(M; x) box in
gure 2) and decryption (the D(C; x) box) use the same key; in other words,
e and d are the same. Note that, it would not be wise to send the key on an
insecure channel in this case, as the adversary will then be able to capture the
key and will be able to gain control on the message.
19-10-2010, 09:36 AM
Post: #3
RE: rsa algorithm full report
This article is presented by:
JooSeok Song
The RSA Algorithm


Private-Key Cryptography

traditional private/secret/single key cryptography uses one key
shared by both sender and receiver
if this key is disclosed communications are compromised
also is symmetric, parties are equal
hence does not protect sender from receiver forging a message & claiming is sent by sender

Public-Key Cryptography

probably most significant advance in the 3000 year history of cryptography
uses two keys – a public & a private key
asymmetric since parties are not equal
uses clever application of number theoretic concepts to function
complements rather than replaces private key crypto

Public-Key Cryptography

public-key/two-key/asymmetric cryptography involves the use of two keys:
a public-key, which may be known by anybody, and can be used to encrypt messages, and verify signatures
a private-key, known only to the recipient, used to decrypt messages, and sign (create) signatures
is asymmetric because
those who encrypt messages or verify signatures cannot decrypt messages or create signatures
Why Public-Key Cryptography?

developed to address two key issues:
key distribution – how to have secure communications in general without having to trust a KDC with your key
digital signatures – how to verify a message comes intact from the claimed sender
public invention due to Whitfield Diffie & Martin Hellman at Stanford Uni in 1976
known earlier in classified community
For more information about this article,please follow the link:
http://ewubd.edu/~allayear/lecture/The%2...orithm.ppt

Please Use Search http://seminarprojects.com/search.php wisely To Get More Information About A Seminar Or Project Topic
05-11-2012, 11:05 AM
Post: #4
RE: rsa algorithm full report
to get information about the topic "rsa algorithm" full report ppt and related topic refer the link bellow

http://seminarprojects.com/Thread-rsa-al...ull-report

http://seminarprojects.com/Thread-progra...-algorithm
Rating rsa algorithm full report Options
Share rsa algorithm full report To Your Friends :- Seminar Topics Bookmark
Post Reply 

Marked Categories : rsa algo ppt, ppt for rsa algorithms, rsa algorithm example ppt, rsa algorithm ppt presentation, rsa algorithm in c pdf, rsa algorithm report, use of rsa algorithm, rsa algorithm with example ppt, applicationof rsa algorithm, rsa encryption algorithm ppt, rsa algotithm applications, rsa algorithm introduction and abstarct, rsa algorithm abstract, rsa algorithm project report, abstarct on rsa algorithm, rsa cryptosystem, pdf to rsa algoritm, rsa algorithm full roport, technical seminar on rsa algorithm, rsa algorithm project presentation, pdf files on rsa algorithm, rsa algorithm, abstract for rsa algorithm project, rsa algorithm ppt, rsa algorithm seminar report,

[-]
Quick Reply
Message
Type your reply to this message here.


Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  4G Wireless Systems Full Seminar Report Download computer science crazy 126 99,206 23-10-2014 10:09 AM
Last Post: mkaasees
  WISENET-Wireless Sensor Network (Download Seminar Report) Computer Science Clay 86 62,340 18-10-2014 10:22 AM
Last Post: mkaasees
  BLUE BRAIN TECHNOLOGY SEMINAR REPORT project maker 0 134 11-10-2014 10:11 AM
Last Post: project maker
  ECHO CANCELLATION USING THE LMS ALGORITHM project maker 0 46 10-10-2014 03:20 PM
Last Post: project maker
  Retina Based Mouse Control seminar report project maker 0 83 10-10-2014 12:14 PM
Last Post: project maker
  Microencapsulation seminar report project maker 0 65 10-10-2014 10:55 AM
Last Post: project maker
  a study on organisation seminar report project maker 0 64 10-10-2014 09:56 AM
Last Post: project maker
   ROADS FROM PLASTIC WASTE SEMINAR REPORT project maker 0 75 09-10-2014 11:53 AM
Last Post: project maker
  Data Integrity Proofs in Cloud Storage seminar report project maker 0 74 09-10-2014 11:14 AM
Last Post: project maker
  3D SEARCHING SEMINAR REPORT project maker 0 75 09-10-2014 10:35 AM
Last Post: project maker
This Page May Contain What is rsa algorithm full report And Latest Information/News About rsa algorithm full report,If Not ...Use Search to get more info about rsa algorithm full report Or Ask Here

Options: