Font Size: a A A

Analysis Of RSA Cryptosystem, Public Key And Private Key

Posted on:2008-07-25Degree:MasterType:Thesis
Country:ChinaCandidate:H J ShenFull Text:PDF
GTID:2120360242956403Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet, resource-sharing is widely used in the field such as politics, military, economy, electronic commerce and etc. A great deal of data is saved and transmitted through Internet. However, the data may be interrupted, intercepted, captured, tampered with and counterfeited during the process of saving, using and transmitting in the network.. Therefore, safeguarding measures should be adopted to protect data during the transmission process in the network.Among the various public key cryptosystem, RSA algorithm is the best choice in both theory and application, and it is often used in digital signature and identification system.My paper includes five chapters as below:The first chapter introduces information safety technology in communication network.The second chapter gives the basic concepts of cryptogram including number theory and modular arithmetic. Besides, it gives an introduction of history of cryptanalysis and some most important cryptosystems throughout its history.The third chapter presents some details about the RSA algorithm, which is a public-key algorithm with a pair of keys called the public-key and the private-key. In this algorithm, the public-key and algorithm itself are able to be open, with the private-key possessed by the user himself. From its birth, RSA has always being applied for its excellent performance of high security and convenient usage and so on. Nowadays RSA is involved into lots of cryptosystems.The fourth chapter is the main part of this thesis. It aimed at the application of the RSA cryptosystem on the field of business, bank, and Interact and information safety. It analyzed the danger of improper designation of the RSA cryptosystem. The condition including public key and private key has been found. The safety of the RSA cryptosystem on this condition has been analyzed.The last chapter is a conclusion of the whole thesis. It gives foreground and prospect of RSA.
Keywords/Search Tags:The RSA cryptosystem, Public key, Private key, Security
PDF Full Text Request
Related items