Loading [MathJax]/extensions/MathZoom.js
Research and implementation of RSA algorithm for encryption and decryption | IEEE Conference Publication | IEEE Xplore

Research and implementation of RSA algorithm for encryption and decryption


Abstract:

Cryptographic technique is one of the principal means to protect information security. Not only has it to ensure the information confidential, but also provides digital s...Show More

Abstract:

Cryptographic technique is one of the principal means to protect information security. Not only has it to ensure the information confidential, but also provides digital signature, authentication, secret sub-storage, system security and other functions. Therefore, the encryption and decryption solution can ensure the confidentiality of the information, as well as the integrity of information and certainty, to prevent information from tampering, forgery and counterfeiting. Encryption and decryption algorithm's security depends on the algorithm while the internal structure of the rigor of mathematics, it also depends on the key confidentiality. Key in the encryption algorithm has a pivotal position, once the key was leaked, it means that anyone can be in the encryption system to encrypt and decrypt information, it means the encryption algorithm is useless. Therefore, what kind of data you choose to be a key, how to distribute the private key, and how to save both data transmission keys are very important issues in the encryption and decryption algorithm. This paper proposed an implementation of a complete and practical RSA encrypt/decrypt solution based on the study of RSA public key algorithm. In addition, the encrypt procedure and code implementation is provided in details.
Date of Conference: 22-24 August 2011
Date Added to IEEE Xplore: 15 September 2011
ISBN Information:
Conference Location: Harbin, Heilongjiang

Contact IEEE to Subscribe

References

References is not available for this document.