IT Questions and Answers :)

Wednesday, November 22, 2017

Which of the following techniques was ultimately used as the basis of RSA encryption?

Which of the following techniques was ultimately used as the basis of RSA encryption?

  • Knapsack-based
  • Product of primes
  • Permutation polynomials
  • Group of unknown size 
Which of the following techniques was ultimately used as the basis of RSA encryption?

EXPLANATION

Ron Rivest, Adi Shamir, and Leonard Adleman ("R.S.A.") at the Massachusetts Institute of Technology made several attempts, over the course of a year, to create a one-way function that was hard to invert. Rivest and Shamir, as computer scientists, proposed many potential functions, while Adleman, as a mathematician, was responsible for finding their weaknesses. They tried many approaches including "knapsack-based" and "permutation polynomials".
The keys for the RSA algorithm are generated the following way:
  • Choose two distinct prime numbers p and q.
    • For security purposes, the integers p and q should be chosen at random, and should be similar in magnitude but 'differ in length by a few digits' to make factoring harder. Prime integers can be efficiently found using a primality test.
  • Compute n = pq.
    • n is used as the modulus for both the public and private keys. Its length, usually expressed in bits, is the key length.
  • Compute λ(n) = lcm(λ(p), λ(q)) = lcm(p − 1, q − 1), where λ is Carmichael's totient function. This value is kept private.
  • Choose an integer e such that 1 < e < λ(n) and gcd(e, λ(n)) = 1; i.e., e and λ(n) are coprime.
  • Determine d as de−1 (mod λ(n)); i.e., d is the modular multiplicative inverse of e (modulo λ(n)).
    • This is more clearly stated as: solve for d given de ≡ 1 (mod λ(n)).
    • e having a short bit-length and small Hamming weight results in more efficient encryption – most commonly e = 216 + 1 = 65,537. However, much smaller values of e (such as 3) have been shown to be less secure in some settings. 
    • e is released as the public key exponent.
    • d is kept as the private key exponent.
The public key consists of the modulus n and the public (or encryption) exponent e. The private key consists of the modulus n and the private (or decryption) exponent d, which must be kept secret. p, q, and λ(n) must also be kept secret because they can be used to calculate d.

SOURCE

https://people.csail.mit.edu/rivest/pubs/ARS03.rivest-slides.pdf

Share:

Related Posts:

0 comments:

Post a Comment

 On 30 september 2021, at 20:01, Dominick commented on which of following is not cloud
 On 20 july 2021, at 11:50, Anonymous commented on which of following is false about ddr2
 On 03 march 2021, at 13:49, Anonymous commented on which of following layers is layer 4 in
 On 02 january 2021, at 20:23, Anonymous commented on when open source software is used in
 On 30 october 2020, at 01:42, Anonymous commented on which of following is true regarding
 On 16 october 2020, at 18:27, Anonymous commented on which of following modules cannot be
 On 15 october 2020, at 13:54, Myles commented on in javascript which of following
 On 24 june 2020, at 05:50, Anonymous commented on in which layer of osi model would you
 On 26 may 2020, at 15:01, Myles commented on in javascript which of following
 On 24 february 2020, at 10:56, Anonymous commented on what is difference between tacacs and
 On 18 february 2020, at 11:56, Anonymous commented on what video conferencing application
 On 20 november 2019, at 18:18, Ranjitkumar commented on irq 1 is commonly assigned to the
 On 20 november 2019, at 12:36, RMS commented on irq 1 is commonly assigned to the
 On 06 september 2019, at 14:40, Ranjitkumar commented on what is acronym for management system
 On 06 september 2019, at 11:07, RMS commented on what is acronym for management system
 On 05 september 2019, at 00:48, Anonymous commented on how do you block user from opening
 On 27 august 2019, at 16:47, Anonymous commented on at what location in microsoft windows
 On 23 july 2019, at 22:31, Anonymous commented on in cryptography initialization vector
 On 17 july 2019, at 10:30, Anonymous commented on which of these is not use case of
 On 28 june 2019, at 06:38, Anonymous commented on which of following is not computer

Popular Posts