Professional Documents
Culture Documents
p a
a Z f or any a ime, then If p is pr
rem ittle Theo Fermats L
p
p
Encryption
RSA technicals
Select 2 prime numbers p and q
Let n=pq
Select a small odd integer e relatively prime to (p-1)(q-1)
Compute the modular inverse d of e, i.e. the solution to the
equation
Publish the pair P=(e,n) as the public key
Keep secret the pair S=(d,n) as the secret key
( )( ) 1 1 mod 1 = q p de
Encryption
For this specification of the RSA system, the message domain is Z
n
Encryption of a message M in Z
n
is done by defining
Decrypting the message is done by computing
n M M P C
e
mod ) ( = =
( ) n C C S
d
mod =
Encryption
Let us verify that the RSA scheme does in fact define an invertible
mapping of the message.
( ) ( ) ( ) ( )
( )( )
( )
theorem.) s Fermat' applying by follow steps last (the
mod
mod
mod mod
Hence, . integer some for
1 1 1
other each of inverses modular are and Since
n. mod
any For
) 1 (
) 1 ( ) 1 (
) 1 )( 1 (
M n M M
n M MM
n MM n M
k
q p k ed
e d
M M P S M S P
Z M
k
q
q k p
q p k ed
ed
n
= =
=
=
+ =
-
= =
e -
Encryption
Note that the security of the encryption system rests on the fact that
to compute the modular inverse of e, you need to know the number
(p-1)(q-1), which requires knowledge of the factors p and q.
Getting the factors p and q, in turn, requires being able to factor the
large number n=pq. This is a computationally difficult problem.
Some examples:
http://econ.gsia.cmu.edu/spear/rsa3.asp
Encryption
Applications
Direct message encryption
Digital Signatures
Use secret key to encrypt signature: S(Name)
Appended signature to message and send to recipient
Recipient decrypts signature using public key: P(S(Name)=Name
Encrypted message and signature
Create digital signature as above, appended to message, encrypt
message using recipients public key
Recipient uses own secret key to decrypt message, then uses senders
public key to decrypt signature, thus verifying sender
Policy Issues
Privacy and verification
Transaction costs and micro-payments
Monetary effects
Domestic money supply control and economic policy levers
International currency exchanges and exchange rate stability
Market organization effects
Development of new financial intermediaries
Effects on government
Seniorage
Legal issues