Hi am Mohamed i would like to get details on advantage and disadvantage of rsa algorithm ..My friend Justin said advantage and disadvantage of rsa algorithm will be available here and now i am living at ......... and i last studied in the college/school ......... and now am doing ....i need help on ......etc
Posts: 14,118
Threads: 61
Joined: Oct 2014
RSA is the algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm. Asymmetric means that there are two different keys. This is also called public key cryptography, because one of them can be given to everyone.RSA is the algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm. Asymmetric means that there are two different keys. This is also called public key cryptography, because one of them can be given to everyone. The other key must be kept private. It is based on the fact that finding the factors of an integer is hard (the factoring problem). RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described it in 1978. A user of RSA creates and then publishes the product of two large prime numbers, along with an auxiliary value, as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message.
Posts: 636
Threads: 0
Joined: Jun 2016
With the continuous development of society and the prevalence of computer and network technology. How to ensure the security of information in the course of transmission have become the most important things for people at present. With this background, we studied how to realize encryption and decryption of the RSA (Initials of Ron Rivest, Adi Shamirh, LenAdleman) encryption technology. This study mainly introduces the application of RSA algorithm in encryption and decryption, mentions the technology of digital signature. Also introduces in the process of implementation of RSA algorithm in Visual Studios environment and operation results. Using this system for encryption and decryption of information, theoretically, good results were obtained in safety and reliability.