Skip to main content Accessibility help
×
Hostname: page-component-586b7cd67f-2plfb Total loading time: 0 Render date: 2024-11-22T10:22:23.121Z Has data issue: false hasContentIssue false
This chapter is part of a book that is no longer available to purchase from Cambridge Core

6 - RSA Encryption

Todd Feil
Affiliation:
Denison University
Get access

Summary

Public-key encryption

In the previous chapters, we looked at many cipher systems where we spent quite a bit of effort developing techniques (1) to determine what method might have been used to encrypt a given cipher text and, once that was known, (2) to “crack” the cipher and come up with the key. In all these methods, an enemy knowing the encryption key compromises the system as it is an easy step to figure out the decryption key. Likewise, knowing the decryption key allows one to easily recover the encryption key. Such system are sometimes called symmetric ciphers or secret-key ciphers. Furthermore, all these methods are what we might term pencil-and-paper methods, as they can be implemented using only paper and pencil. The methods we are about to examine require the power of computers in order to perform the necessary computations.

In contrast to a secret-key cipher, a public-key cipher is a cipher where the encryption key is made public while the decryption key is kept secret. This allows many people to encrypt a message to the holder of the decryption key. Of course, knowledge of the encryption key in a public-key cipher must not allow someone to recover the decryption key, at least not without a tremendous amount of effort. (Thus all our previous ciphers fail miserably in this regard.) Public-key ciphers are also known as asymmetric ciphers, to distinguish them from symmetric ciphers.

Type
Chapter
Information
Elementary Cryptanalysis
A Mathematical Approach
, pp. 159 - 178
Publisher: Mathematical Association of America
Print publication year: 2009

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • RSA Encryption
  • Abraham Sinkov
  • Revised by Todd Feil, Denison University
  • Book: Elementary Cryptanalysis
  • Online publication: 05 January 2012
  • Chapter DOI: https://doi.org/10.5948/UPO9780883859377.008
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • RSA Encryption
  • Abraham Sinkov
  • Revised by Todd Feil, Denison University
  • Book: Elementary Cryptanalysis
  • Online publication: 05 January 2012
  • Chapter DOI: https://doi.org/10.5948/UPO9780883859377.008
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • RSA Encryption
  • Abraham Sinkov
  • Revised by Todd Feil, Denison University
  • Book: Elementary Cryptanalysis
  • Online publication: 05 January 2012
  • Chapter DOI: https://doi.org/10.5948/UPO9780883859377.008
Available formats
×