Cryptology - Unofficial St. Mary's College of California Web Site
Cryptology - Unofficial St. Mary's College of California Web Site
Cryptology - Unofficial St. Mary's College of California Web Site
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
12.9. RSA AND PUBLIC KEYS 245<br />
There are at least two interesting things about these examples. First, because<br />
<strong>of</strong> the choice <strong>of</strong> small numbers for P and Q in Example (1), the RSA<br />
cipher became a complicated mono-graphic cipher. Frequency analysis <strong>of</strong> the<br />
type we practiced in Chapter 6 would easily break this cipher. However, by<br />
choosing P and Q so that N was larger than 2626 in Examples (2) and (3) we<br />
used RSA as a digraphic cipher. And if we had chosen P = 487, Q = 541 then<br />
N = 263467 would have let us use RSA as trigraphic cipher.<br />
The second thing was how encryption and decryption, while very similar<br />
processes, involve very different amounts <strong>of</strong> knowledge. To encipher we only<br />
need to know e and N, for the only thing we must do is to compute M e %N. In<br />
particular, we do not need either P or Q. To decipher, however, we do need to<br />
know P and Q, because to find d we must use (P −1)(Q−1). The application <strong>of</strong><br />
this differential knowledge is what allows RSA to be public key cipher system.<br />
12.9 RSA and Public Keys<br />
The information needed to use any particular RSA cipher is very different for<br />
the encryptor than it is for the decryptor. To encipher a message one only<br />
needs the power e and the modulus N. The values <strong>of</strong> d and (P − 1)(Q − 1)<br />
are unnecessary. When deciphering we need N, but also need d, and need e<br />
and (P − 1)(Q − 1) to determine d. That is, the decipherer needs P and Q to<br />
determine d.<br />
This allows RSA to be used as a public key code. Alice chooses the two<br />
primes P and Q and computes their product N. Then she chooses e and uses<br />
P and Q to compute d. Alice then makes public the values N and e. Since<br />
all that is needed to encipher a message is e and N, anyone can send Alice a<br />
message using her system.<br />
Alice Anderson<br />
Phone: 1-800-CALL-ALC<br />
Email: alice a○mymail.com<br />
I use RSA. My public keys are<br />
e = 17 and N = 549992441.<br />
Conversely, Alice keeps P , Q, (P − 1)(Q − 1) and d all secret. Since she<br />
knows d she can decipher any message sent to her. 14<br />
12.10 How to break RSA<br />
Suppose we capture an enciphered message E that is intended for our enemy.<br />
How can we read the message<br />
14 Since to decipher she only need to raise to the d-th power modulo N, she should throw P ,<br />
Q and (P − 1)(Q − 1) away, erase them from any computers they are on and burn any papers<br />
they are written on.