THE 3
rd
INTERNATIONAL SCIENTIFIC CONFERENCES OF STUDENTS AND YOUNG RESEARCHERS
dedicated to the 99
th
anniversary of the National Leader of Azerbaijan Heydar Aliyev
217
RSA.
RSA stands for Rivest-Shamir-Adleman who are the discoverers
of RSA. RSA is the most popular and widely used asymmetric cryptographic
algorithm. Implementation of the RSA algorithm requires the following 3
steps: generation of pair of keys, encryption of data with a public key and
decryption with a private key. The algorithm
itself is quite simple for
realization, but the challenge is caused by the generation of keys, for which
consecutive operations with two large randomly-chosen prime numbers,
p
and
q
, that may consist of up to 100 digits are needed. The key size and
block size of encrypted data depend on the modulus N (N=
p*q
). Despite
being the best-known public-key cryptographic algorithm, RSA has several
vulnerabilities and can be cracked with
rudimentary hardware with
mathematical attacks, namely the Factorization attack, and the side-channel
attack.
Dostları ilə paylaş: