The Continuing Story of Alice and Bob: A Discussion of RSA Cryptography
Loading...
Authors
Neumann, Nicholas D.
Issue Date
2002
Type
Thesis
Language
en_US
Keywords
Alternative Title
Abstract
RSA has been, and continues, to be an essential tool of cryptography in a large
part because of the mathematics that makes up the algorithm. The main mathematical
element, modular exponentiation, with the help of mathematical properties inherent in
prime numbers, provides the framework through which RSA works, and allows the
algorithm the flexibility to act as both a cryptosystem and a digital signature scheme. In
most cases RSA is used in conjunction with other cryptographic tools such as hash
functions, secret key cryptosystems, block and/or stream ciphers, and digital signatures in
order to increase security. For example, RSA is an essential component of systems such
as PGP, where the algorithm acts as the digital signature scheme, providing a way for
users to securely identify each other in email and other PGP mediums.
With recent advances in palm pilots, especially when they are used in conjunction
with wireless communication, RSA is beginning to be used more and more on its own.
As with the Internet, anyone can intercept data sent over wireless communication, and so
cryptographic schemes are necessary to encipher this data. However, palm pilots do not
have the capacity to combine very many cryptographic tools to create quick and easy
security, and so they use the RSA algorithm alone as a cryptosystem. In cases such as
this the security of the RSA algorithm comes from the key-size, which at this time is
usually set at 1024 bits. Since the largest key-size that has been cracked so far is 512-bit
and since the 567 -bit key has stood as the next largest key for two and a half years now,
the 1 024-bit keys provide the perfect protection for palm pilots and other such small
computers. Also, since the 512-bit key was cracked, the 2048-bit keys have reached the
point where they do not take an exceptionally large amount of time to create, and so are
in use more and more. As long as this trend of larger key sizes becoming easier to create
as smaller key sizes are cracked continues, the RSA Algorithm w!ll continue to be an
industry standard for encryption.
Description
iii, 36 p.
Citation
Publisher
License
U.S. copyright laws protect this material. Commercial use or distribution of this material is not permitted without prior written