diff options
author | Holden Rohrer <holden.rohrer@gmail.com> | 2019-10-21 22:59:08 -0400 |
---|---|---|
committer | Holden Rohrer <holden.rohrer@gmail.com> | 2019-10-21 22:59:08 -0400 |
commit | 38d8fa8919a3624a6d2efea1ed77720ea8f32794 (patch) | |
tree | 57b50e09a86e01de83351996c328f1bce25f0e10 | |
parent | 1a3e971805c9ef515695f7688ed6000dfafbf369 (diff) |
RSA update
-rw-r--r-- | progress/RSA.tex | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/progress/RSA.tex b/progress/RSA.tex index 67d57c6..fe70e81 100644 --- a/progress/RSA.tex +++ b/progress/RSA.tex @@ -1,4 +1,3 @@ Perhaps the most famous public-key cryptosystems algorithm is the RSA algorithm. This algorithm makes use of the difficulty to determine the prime factorization of large numbers, the infinite number of primes in existence, Euler’s theorem, and the Euclidean Algorithm to encrypt communication. The RSA algorithm is an asymmetric (two keys) cryptographic algorithm, and can also be classified as public-key cryptography, as it involves the general knowledge of one of the keys. -As computer power and shortcuts to factorize large numbers become more efficient as we progress through the 21st century, the rapid increase of the magnitude of the large primes is necessary to keep encryptions secure. Decryption on the receiving end of the encrypted message uses a variety of techniques to decrypt the message efficiently, including the Chinese Remainder Theorem. - +As computer power and shortcuts to factorize large numbers become more efficient as we progress through the 21st century, the rapid increase of the magnitude of the large primes is necessary to keep encryptions secure. Decryption on the receiving end of the encrypted message uses a variety of techniques to decrypt the message efficiently, including the Chinese Remainder Theorem. |