8.4 RSA: Rivest–Shamir–Adleman

After studying Diffie and Hellman’s 1976 paper describing the public-key cryptography problem and their initial solution, three researchers at MIT began searching for an improved approach. After several months, they found a very flexible technique that performs asymmetric encryption and decryption. It is called RSA after the researchers: Ron Rivest, Adi Shamir, and Len Adleman. The basic technique, like Diffie–Hellman, uses modular exponentiation.

RSA public and private keys consist of pairs of numbers. Each contains two of the following:

  • N—the modulus, part of both RSA key pairs

  • e—the public exponent, part of the RSA public key

  • de’s modular inverse, the secret part of the private key

There is no g, as there ...

Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.