06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

250 CHAPTER 12. RSA<br />

two large primes. Euler’s Theorem allows us to decipher messages by raising<br />

the ciphertext to a power modulo the same product. The deciphering power<br />

is the multiplicative inverse <strong>of</strong> the enciphering power modulo a number easily<br />

computed from the two original primes.<br />

When dealing with large primes, and here large means approximately 300<br />

digits each, exponentiation must be done carefully so that the size <strong>of</strong> the numbers<br />

does not overwhelm the computer or calculator being used. In general,<br />

to compute the value (a b )%n, where a, b and n could all be sizable values and<br />

n is either prime or the product <strong>of</strong> two primes, first reduce a modulo n, then<br />

reduce b modulo n − 1 (if n is prime) or modulo (p − 1)(q − 1) (if n = pq is a<br />

product <strong>of</strong> primes). Next, a “binary chart” is used to simultaneously write the<br />

remainder <strong>of</strong> b in binary and compute the powers <strong>of</strong> the remainder <strong>of</strong> a. Finally,<br />

the necessary powers <strong>of</strong> the remainder <strong>of</strong> a are combined to produce the final<br />

value.<br />

The RSA system has become the world’s most widely-known Public Key<br />

cryptosystem. The private information is the deciphering key and the two<br />

primes, and the public information is the product <strong>of</strong> the primes and the enciphering<br />

exponent. RSA also provides for digital signatures, a method by which<br />

the sender can prove their identity. Although RSA is slow when compared with<br />

popular private key systems, it pairs easily with any such system: encipher your<br />

message with a private key system, encipher the key with RSA and then send<br />

the enciphered key and the ciphertext as a two-part message.<br />

Outside <strong>of</strong> poor uses <strong>of</strong> the system (e.g., a bad choice <strong>of</strong> parameters), which<br />

are generally easy to avoid, the RSA system seems very difficult to break. Its<br />

security seems to depend on the difficulty <strong>of</strong> factoring the product <strong>of</strong> the two<br />

large primes. While factoring has been studied for many, many years, there no<br />

publicly-known general method that will factor the product <strong>of</strong> two well-chosen<br />

primes in any realistically small amount <strong>of</strong> time. So, for the time being at least,<br />

RSA is one <strong>of</strong> the most secure ciphersystems known.<br />

12.13 Topics and Techniques<br />

1. What is Fermat’s Theorem How to use it Under what conditions does<br />

it apply<br />

2. Is raising a number to a large power modulo a prime ever the same as<br />

raising that same number to a smaller power modulo the same prime<br />

Explain.<br />

3. What is “double modular arithmetic”<br />

4. If I have a large number raised to a large number that I want to reduce<br />

modulo a smaller prime, how do I go about making this problem more<br />

manageable<br />

5. What is the binary expansion <strong>of</strong> a number How to find it

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!