Cryptography, Information Theory, and Error-Correction. Aiden A. Bruen
Чтение книги онлайн.

Читать онлайн книгу Cryptography, Information Theory, and Error-Correction - Aiden A. Bruen страница 39

СКАЧАТЬ rel="nofollow" href="#fb3_img_img_6e526cfc-c043-519e-9784-cc23fa133695.png" alt="left-bracket bold-italic u bold-italic comma bold-italic v right-bracket"/>means the remainder when bold-italic uis divided by bold-italic v, so in other words Alice multiplies upper M by itself e times and gets the remainder upon division by upper N. This can be done quickly using the “repeated squaring” method and the principle described earlier. Note that e can be any positive integer relatively prime to p minus 1 and q minus 1. However, suppose Rem left-bracket e comma left-parenthesis p minus 1 right-parenthesis left-parenthesis q minus 1 right-parenthesis right-bracket equals e 1. Then it can be shown that Rem left-bracket upper M Superscript e Baseline comma upper N right-bracket equals Rem left-bracket upper M Superscript e 1 Baseline comma upper N right-bracket, and so we may as well assume that e less-than left-parenthesis p minus 1 right-parenthesis left-parenthesis q minus 1 right-parenthesis.

      When Bob receives upper C equals upper M Superscript e, he in turn multiplies upper C by itself d times and gets the remainder upon division by upper N. As explained in our earlier example, the calculation can be simplified. This remainder is in fact equal to upper M, the original message.

      Let us formalize the procedure.

      The RSA Algorithm.

      1 Bob chooses in secret two large primes with and sets .

      2 Bob chooses bigger than 1 with relatively prime to and to , and with .

      3 Bob calculates the decryption index , where is such that the remainder of on division by is 1. More generally, Bob calculates a decryption index , where is such that the remainder of on division by is 1. Here, is any number divisible by both and .

      4 Bob announces his public key and keeps his private key secret.

      5 Alice wishes to send a secret message and represents as a number between 0 and . Alice then encrypts the message as the remainder of upon division by and transmits to Bob.

      6 Bob decrypts by calculating the remainder of upon division by : this gives the original secret message .

      Remark 3.2

      If p comma q are odd, then p minus 1 comma q minus 1 are even, and so each is divisible by 2. So by choosing t to be the least common multiple of p minus 1 and q minus 1, we get that t less-than-or-equal-to left-parenthesis p minus 1 right-parenthesis left-parenthesis q minus 1 right-parenthesis slash 2.

      Remark 3.3

      Another example of the RSA algorithm

      In the example below, we also briefly indicate how more sophisticated number theory can shorten the calculations.