Cryptology - Unofficial St. Mary's College of California Web Site
Cryptology - Unofficial St. Mary's College of California Web Site
Cryptology - Unofficial St. Mary's College of California Web Site
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
250 CHAPTER 12. RSA<br />
two large primes. Euler’s Theorem allows us to decipher messages by raising<br />
the ciphertext to a power modulo the same product. The deciphering power<br />
is the multiplicative inverse <strong>of</strong> the enciphering power modulo a number easily<br />
computed from the two original primes.<br />
When dealing with large primes, and here large means approximately 300<br />
digits each, exponentiation must be done carefully so that the size <strong>of</strong> the numbers<br />
does not overwhelm the computer or calculator being used. In general,<br />
to compute the value (a b )%n, where a, b and n could all be sizable values and<br />
n is either prime or the product <strong>of</strong> two primes, first reduce a modulo n, then<br />
reduce b modulo n − 1 (if n is prime) or modulo (p − 1)(q − 1) (if n = pq is a<br />
product <strong>of</strong> primes). Next, a “binary chart” is used to simultaneously write the<br />
remainder <strong>of</strong> b in binary and compute the powers <strong>of</strong> the remainder <strong>of</strong> a. Finally,<br />
the necessary powers <strong>of</strong> the remainder <strong>of</strong> a are combined to produce the final<br />
value.<br />
The RSA system has become the world’s most widely-known Public Key<br />
cryptosystem. The private information is the deciphering key and the two<br />
primes, and the public information is the product <strong>of</strong> the primes and the enciphering<br />
exponent. RSA also provides for digital signatures, a method by which<br />
the sender can prove their identity. Although RSA is slow when compared with<br />
popular private key systems, it pairs easily with any such system: encipher your<br />
message with a private key system, encipher the key with RSA and then send<br />
the enciphered key and the ciphertext as a two-part message.<br />
Outside <strong>of</strong> poor uses <strong>of</strong> the system (e.g., a bad choice <strong>of</strong> parameters), which<br />
are generally easy to avoid, the RSA system seems very difficult to break. Its<br />
security seems to depend on the difficulty <strong>of</strong> factoring the product <strong>of</strong> the two<br />
large primes. While factoring has been studied for many, many years, there no<br />
publicly-known general method that will factor the product <strong>of</strong> two well-chosen<br />
primes in any realistically small amount <strong>of</strong> time. So, for the time being at least,<br />
RSA is one <strong>of</strong> the most secure ciphersystems known.<br />
12.13 Topics and Techniques<br />
1. What is Fermat’s Theorem How to use it Under what conditions does<br />
it apply<br />
2. Is raising a number to a large power modulo a prime ever the same as<br />
raising that same number to a smaller power modulo the same prime<br />
Explain.<br />
3. What is “double modular arithmetic”<br />
4. If I have a large number raised to a large number that I want to reduce<br />
modulo a smaller prime, how do I go about making this problem more<br />
manageable<br />
5. What is the binary expansion <strong>of</strong> a number How to find it