{"title":"Why RSA? A Pedagogical Comment","authors":"P. Olague, O. Kosheleva, V. Kreinovich","doi":"10.12988/JITE.2017.61248","DOIUrl":null,"url":null,"abstract":"One of the most widely used cryptographic algorithms is the RSA algorithm in which a message m encoded as the remainder c of m modulo n, where n and e are given numbers – forming a public code. A similar transformation c mod n, for an appropriate secret code d, enables us to reconstruct the original message. In this paper, we provide a pedagogical explanation for this algorithm. 1 RSA Algorithm: A Pedagogical Puzzle RSA algorithm: a brief reminder. In many computer transaction, the communicated message is encoded, to avoid eavesdropping. This happens, e.g., every time a credit card information is passed over to some website. In most of such cases, a special RSA algorithm is used to encode the message m; see, e.g., [1]. In this algorithm, two specially selected and publicly available numbers n and e are used to encode the message. The encoded message c has the form of the remainder c = m mod n. The number n is usually at least 100 decimal digits long, and the number e is similarly large. For such large numbers, it is not feasible to compute m simply as m · . . . ·m, by starting with m and e− 1 times multiplying the result by m. Instead, the following much faster algorithm is performed. First, the number e is represented in the binary form, as the sum of powers of two: e = 21 + 22 + . . . + 2p for some k1 > k2 > . . . > kp. For example, 1110 is represented as 10112 = 2 3 + 2 + 2 = 8 + 2 + 1.","PeriodicalId":0,"journal":{"name":"","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12988/JITE.2017.61248","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
One of the most widely used cryptographic algorithms is the RSA algorithm in which a message m encoded as the remainder c of m modulo n, where n and e are given numbers – forming a public code. A similar transformation c mod n, for an appropriate secret code d, enables us to reconstruct the original message. In this paper, we provide a pedagogical explanation for this algorithm. 1 RSA Algorithm: A Pedagogical Puzzle RSA algorithm: a brief reminder. In many computer transaction, the communicated message is encoded, to avoid eavesdropping. This happens, e.g., every time a credit card information is passed over to some website. In most of such cases, a special RSA algorithm is used to encode the message m; see, e.g., [1]. In this algorithm, two specially selected and publicly available numbers n and e are used to encode the message. The encoded message c has the form of the remainder c = m mod n. The number n is usually at least 100 decimal digits long, and the number e is similarly large. For such large numbers, it is not feasible to compute m simply as m · . . . ·m, by starting with m and e− 1 times multiplying the result by m. Instead, the following much faster algorithm is performed. First, the number e is represented in the binary form, as the sum of powers of two: e = 21 + 22 + . . . + 2p for some k1 > k2 > . . . > kp. For example, 1110 is represented as 10112 = 2 3 + 2 + 2 = 8 + 2 + 1.