BITSF463_LECT12
BITSF463_LECT12
CRYPTOGRAPHY
2nd sem 2024-2025
Lecture 12
Principles Of Public-Key
Cryptosystems
❖ Public-Key Cryptosystems
❖ Applications for Public-Key Cryptosystems
❖ Requirements for Public-Key Cryptography
❖ Public-Key Cryptanalysis
❖ RSA is the best known, and by far the most widely used
general public key encryption algorithm, and was first
published by Rivest, Shamir & Adleman of MIT in 1978
[RIVE78]
❖ RSA has reigned supreme as the most widely accepted and
implemented general-purpose approach to public-key
encryption
❖ It is based on exponentiation in a finite (Galois) field over
integers modulo a prime, using large integers (eg. 1024
bits); Its security is due to the cost of factoring large
numbers
Function exp-by-squaring(x, n)
if n < 0 then return exp-by-squaring(1 / x, -n);
else if n = 0 then return 1;
else if n = 1 then return x ;
else if n is even then return exp-by-squaring(x * x, n / 2);
else if n is odd then return x * exp-by-squaring(x * x, (n - 1) / 2).