aboutsummaryrefslogtreecommitdiff
path: root/final/rsa.tex
diff options
context:
space:
mode:
authorHolden Rohrer <holden.rohrer@gmail.com>2019-11-11 20:58:03 -0500
committerHolden Rohrer <holden.rohrer@gmail.com>2019-11-11 20:58:03 -0500
commita27be593369869d43a9da2d47fd68bef97473fca (patch)
treeba2fc54e9d81b55ed78984e3b6f5fd1b309fc7ef /final/rsa.tex
parent2c8c55cd0511169f9f02a49be79c58d3c02cdc11 (diff)
included some RSA specifics
Diffstat (limited to 'final/rsa.tex')
-rw-r--r--final/rsa.tex5
1 files changed, 4 insertions, 1 deletions
diff --git a/final/rsa.tex b/final/rsa.tex
index 0b2962e..837a00e 100644
--- a/final/rsa.tex
+++ b/final/rsa.tex
@@ -1,8 +1,11 @@
In determining correctness, a major concern is determining that the message hasn't been tampered with by an intelligent intermediate.
Public key cryptography tries to answer this problem by providing proof of authorship and, as an extension of ``normal'' encryption, preventing interception.
-RSA is one such algorithm.
+RSA (Rivest-Shamir-Adleman, named after its MIT faculty creators) is one such algorithm.
It works by providing a set of public keys to all parties, and corresponding secret private keys.
One of the simpler algorithms, it applies the NP-hard nature of factorizing a semiprime, Euler’s theorem, and the Euclidean Algorithm to encrypt communication.
Because it is simple to devise, it has been included as a sample, in the form of a Python script which encrypts and decrypts messages, given a small RSA key (compared to those used in real applications).
There are several optimizations (such as applying the Chinese Remainder Theorem) which can be used, but none have been applied to maintain the code's simplicity.
+
+\sinclude Methodology:rsa-method
+