Term Paper Undergraduate 461 words Human Written

RSA Public-Key Algorithm as Cited in Kaufman,

Last reviewed: ~3 min read Technology › Public
80% visible
Read full paper →
Paper Overview

RSA Public-Key Algorithm As cited in Kaufman, Perlman & Speciner the security features inherent to an RSA public-key algorithm depends on the difficulty that an attacker has in factoring very large, preferably prime numbers. One specific example of an RSA might be as follows: "Step 1: Choose two very large primes" usually by using random number...

Writing Guide
Keys to Formulating Impactful Argumentative Essay Thesis

You already know that your thesis statement is supposed to convey the main point of your paper. They are essential in every type of writing. However, they are critical in argumentative essays. In an argumentative essay, the thesis statement describes the issue and makes your position...

Related Writing Guide

Read full writing guide

Related Writing Guides

Read Full Writing Guide

Full Paper Example 461 words · 80% shown · Sign up to read all

RSA Public-Key Algorithm As cited in Kaufman, Perlman & Speciner the security features inherent to an RSA public-key algorithm depends on the difficulty that an attacker has in factoring very large, preferably prime numbers. One specific example of an RSA might be as follows: "Step 1: Choose two very large primes" usually by using random number generation, such as "simple e.g., P=47, Q=71 and set N = P*Q = 3337 and M = (P-1)*(Q-1) = 3220. Step 2:Choose E. relatively prime to M, e.g. E=79 Set D = E^-1 (mod M) = 79^-1 (mod 3220) = 1019.

Step 3: Public key is (N, E) = (3337, 79). Step 4:Private key is (N, D) = (3337, 1019). Step 5:To encrypt n, C = cipher = n^E (mod N) = n^79 mode 3337." (Newman, 1997) Finding the large primes p and q is usually done by testing random numbers of the right size with probabilistic primary tests, which quickly eliminate most non-prime numbers. "If such a test finds a "probable prime," a deterministic test should then be used to verify that the number is indeed prime," and "p and q should not be "too close," else they are easily decrypted.

(Wordiq Encyclopedia, 2004) Another way of looking at the use of RSA in cryptography is provided by the Wordiq Encyclopedia. This reference posits the supposition that a user might wish to allow another user to send him or her a private message over an insecure transmission medium. The user would then take, to use RSA as a security device, "the following steps," as suggested above, and begin the factoring process by first generating a public key and a private key" using RSA formula.

If an eavesdropper intercepted the public key, it would still be very difficult for him or her to decrypt the message because "no polynomial-time method for factoring large integers on a classical computer has yet been found." However, it has not been proven that none exists." Despite this security precaution, RSA is still much slower than DES and other symmetric cryptosystems." Also, it is of key importance to use a random number generator when determining the keys involved, as "in practice," a user "typically encrypts a secret.

93 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
5 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"RSA Public-Key Algorithm As Cited In Kaufman " (2004, June 21) Retrieved April 21, 2026, from
https://www.paperdue.com/essay/rsa-public-key-algorithm-as-cited-in-kaufman-171757

Always verify citation format against your institution's current style guide.

80% of this paper shown 93 words remaining