Professional Documents
Culture Documents
University of Palestine: Information Security and Risk Management Chapter 3 P2
University of Palestine: Information Security and Risk Management Chapter 3 P2
University of Palestine: Information Security and Risk Management Chapter 3 P2
INFORMATION SECURITY
AND RISK MANAGEMENT
CHAPTER 3 p2
A. JAMIL ALAGHA
ASYMMETRIC ENCRYPTION
R.S.A.
• Advantages
• More Secured
• Authentication
• Disadvantages
• Relatively Complex
• discovered in 1977
RSA Model
Key Generation
Encryption
Decryption
q.
2. Note for security purposes, these prime numbers p and q
should be chosen at random, and must be of similar bit -
length.
3. Compute n = pq.
Plaintext w
n= pq = 17*29 = 493
d=299
IT Security and risk management, Jamil Alagha, Univ. of
Palestine, 2020
RSA EXAMPLE
Now we have: p = 17, q = 29, n= 493, φ(n) = 448 , e=3, d = 299
Encryption: c = PT e mod n
Decryption: PT = c d mod n