We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Number theory and RSA - Essay Example

Comments (1) Cite this document
Summary
Number Theory and RSA By Instructor Institution State Date Number Theory and RSA Introduction Cryptography is a model different from steganography. Steganography is the process by which communication between individuals is secured through completely hiding the existence of the conversation from uninvolved parties, while cryptography is obscuring or just encrypting the messages in a conversation so that anybody who overhears the conversation cannot understand it…
Download full paperFile format: .doc, available for editing
Polish This Essay92.6% of users find it useful
Number theory and RSA
Read TextPreview

Extract of sample
"Number theory and RSA"

Download file to see previous pages At this stage, the message is sent to the recipient, for the receiver to get the clear message, the message is decrypted back to original plaintext. The whole process usually rely on a key, this key give a way to encrypt the message by the sender and a way for the listener to figure out what the message says (decrypt). This can be enabled with the use of the old cryptosystem which used the symmetric keys or the newly and more advanced public key cryptosystem. In symmetric keys one had to possess the key that was used to encrypt the message so as to decrypt back the message at the other end; but for the public key cryptosystem knowing the message does not mean one can decrypt the message (Stinson, 2006). For example, the trapdoor function; in this idea, a function ? is for encryption, so, to decrypt one has to find the inverse, ; which is difficult to find, this means that even if you have ? and you understand the output is A, it is still hard to find (A). However, if it happens that you know k, (extra piece information that acts as a lever that lets the inverse fall through by opening the trapdoor), then from ?, A and k one can easily come up with (A), so in this system k is kept secret but the whole message can be displayed or heard by anyone and it does not pose any threat because nobody can decrypt the message. Number Theory In Number theory, theorems have been derived to explain the public key cryptosystem and the key exchange problem (Martin J. Erickson, 2008). Some studies introduce the sage commands to aid in performing basic number theorems such as Euler’s phi function and greatest common divisor. This happens when coding the algorithms and functions, but mathematically it is not a requirement as we will notice in the examples. In definition, integers greater than 1, and their positive divisors are only 1 and itself, then that is a prime number, otherwise if not then it is a composite number (Martin J. Erickson, 2008). The fundamental theorem of arithmetic is the base equation when dealing with number theory is; n The greatest common divisor of k and m, (gcd (k, m)), is the largest number that can divide both k and m. this two positive integers greater than 0 are relatively prime if gcd (k, m) =1. This can be shown by the extended Euclidian algorithm below (T. H. Cormen, 2001), Input: k, m Output: (d, x, y) subject to d=gcd(k,m) and kx + my = d d=k; t=m; x=1; y=0; r=0; s=1; While (t>0) { q = _d/t_ u=x-qr; v=y-qs; w=d-qt x=r; y=s; d=t r=u; s=v; t=w } return (d, x, y) In the above algorithm, these Invariants were used gcd(k,m)=gcd(d,t) kx + my = d kr + ms = t using the Chinese Reminder Theorem(CRT) (Loxton, 1990), we Let m1, m2, ,,, mk be integers subject to gcd(mi, mj) = 1, i j, and … This means that there exist a unique solution modulo m= and this solution is given by (a1, a2,… ak) = (? ) mod m, Where = m /, and = mod This idea can be proven by these four steps; 1. Set M = 2. Find such that + = 1(this is a Bezout). 3. Note that = 1 if j?? 4. Therefore, the solution to the system equation becomes: Mentioned above is the Bezout’s Identity, which is a property in the greatest common divisor (Martin J. Erickson, 2008). The Bezout’s identify states that for any two natural numbers k and m, there exist integers x ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Number theory and RSA Essay Example | Topics and Well Written Essays - 3250 words”, n.d.)
Retrieved from https://studentshare.org/mathematics/1404317-cryptography-and-coding
(Number Theory and RSA Essay Example | Topics and Well Written Essays - 3250 Words)
https://studentshare.org/mathematics/1404317-cryptography-and-coding.
“Number Theory and RSA Essay Example | Topics and Well Written Essays - 3250 Words”, n.d. https://studentshare.org/mathematics/1404317-cryptography-and-coding.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
ha
handrubye added comment 1 month ago
Student rated this paper as
The topic of "Number theory and RSA" was hard to find. I spent hours to find it. Here at StudentShare, I got the finest example. Many thanks!
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
CAN ALERTNESS OF EMPLOYEES SAVE ORGANISATIONS FROM HACKERS USING SOCIAL ENGINEERING FOR CYBER ATTACKS
Among the main social engineering techniques identified by anti-virus providers such as McAfee and Avira as the methods for disabling target networks include 'spear phishing' emails, which are customized to appear as if from trustworthy sources (Kiountouzis & Kokolakis, 2011).
24 Pages(6000 words)Essay
Cryptography & Coding
The main danger is regarding the communications that are offered nowadays mainly through the internet. The internet offers vital communication among tens of millions of people also is being more and more utilized like a tool intended for commerce. The security of the communication turned out to be an extremely significant matter to deal with.
14 Pages(3500 words)Essay
Case Study 1: Advanced Persistent Threats Against RSA Tokens
Every now and then, there is a news of a major security breach resulting in an invasion of personal privacy data such as credit card details, emails and vice versa. In spite of securing the networks, workstations and data centers, with the most updated and advanced security modules, there is still a probability of a new threat to break into the network and void data integrity.
6 Pages(1500 words)Essay
Symphony Number 6
It starts off soft and slow with just low tones. It then slowly builds up the pitch and tempo. These changes in tempo repeat in certain intervals which gave me the idea of movement. There were also changes of feelings conveyed by said changes. There are periods where the flutes sounded like birds which I think suggested curiosity, joy or frenzy.
2 Pages(500 words)Essay
Number grid
The table below gives some values as we move a square around the grid. Table 1 below are the results of a square that is 2 x 2. The difference in the product of the corners of the 10 x 10 grid is 810. As has been shown, for any given sized square, the difference in the product is the same no matter where on the grid it is placed.
6 Pages(1500 words)Essay
WSJ Analysis Number 3
ce 1999, in the hopes of getting federal approval of its patch called Intrinsa that assures a greater sexual enjoyment for those women who use it themselves. Most notably, “The New England Journal of Medicine on Wednesday published a company-run study of the patch, which
2 Pages(500 words)Essay
FINITE MATHEMATICS - Number Theory
Number 3 is one place right after the decimal point, and it is called “tenths”. Number 4 is two places right after the decimal point, and it is called “hundredths”. Thus, place of 7 is “thousandths”, and
5 Pages(1250 words)Research Paper
The Federalist Number Ten
Madison (1787) is justified to argue that majority factions may oppress the minority for self-gain, prompting the necessity for a government to ensure fairness in a democratic society. Madison argues that two strategies
1 Pages(250 words)Essay
Number Systems
system. In order to represent the base of a no. system first of all the no. is written in the parenthesis and then the base is written down as subscript. For example to write 46 which is a no. in the decimal no. system the correct way to write it is
4 Pages(1000 words)Essay
Philsophical assignment number 3
Logos is a rational order of all things and it is common to all people as well. However, people do not use it much and only some of them come to the point when they recognize Logos and start using it. Logos that is common to all
1 Pages(250 words)Essay
Let us find you another Essay on topic Number theory and RSA for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us