06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

12.9. RSA AND PUBLIC KEYS 245<br />

There are at least two interesting things about these examples. First, because<br />

<strong>of</strong> the choice <strong>of</strong> small numbers for P and Q in Example (1), the RSA<br />

cipher became a complicated mono-graphic cipher. Frequency analysis <strong>of</strong> the<br />

type we practiced in Chapter 6 would easily break this cipher. However, by<br />

choosing P and Q so that N was larger than 2626 in Examples (2) and (3) we<br />

used RSA as a digraphic cipher. And if we had chosen P = 487, Q = 541 then<br />

N = 263467 would have let us use RSA as trigraphic cipher.<br />

The second thing was how encryption and decryption, while very similar<br />

processes, involve very different amounts <strong>of</strong> knowledge. To encipher we only<br />

need to know e and N, for the only thing we must do is to compute M e %N. In<br />

particular, we do not need either P or Q. To decipher, however, we do need to<br />

know P and Q, because to find d we must use (P −1)(Q−1). The application <strong>of</strong><br />

this differential knowledge is what allows RSA to be public key cipher system.<br />

12.9 RSA and Public Keys<br />

The information needed to use any particular RSA cipher is very different for<br />

the encryptor than it is for the decryptor. To encipher a message one only<br />

needs the power e and the modulus N. The values <strong>of</strong> d and (P − 1)(Q − 1)<br />

are unnecessary. When deciphering we need N, but also need d, and need e<br />

and (P − 1)(Q − 1) to determine d. That is, the decipherer needs P and Q to<br />

determine d.<br />

This allows RSA to be used as a public key code. Alice chooses the two<br />

primes P and Q and computes their product N. Then she chooses e and uses<br />

P and Q to compute d. Alice then makes public the values N and e. Since<br />

all that is needed to encipher a message is e and N, anyone can send Alice a<br />

message using her system.<br />

Alice Anderson<br />

Phone: 1-800-CALL-ALC<br />

Email: alice a○mymail.com<br />

I use RSA. My public keys are<br />

e = 17 and N = 549992441.<br />

Conversely, Alice keeps P , Q, (P − 1)(Q − 1) and d all secret. Since she<br />

knows d she can decipher any message sent to her. 14<br />

12.10 How to break RSA<br />

Suppose we capture an enciphered message E that is intended for our enemy.<br />

How can we read the message<br />

14 Since to decipher she only need to raise to the d-th power modulo N, she should throw P ,<br />

Q and (P − 1)(Q − 1) away, erase them from any computers they are on and burn any papers<br />

they are written on.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!