RSA Cryptosystem


A cryptosystem is nothing but a set of cryptographic algorithms with a key management system that is responsible for ensuring confidentiality, integrity and availability of data in some application context.


RSA(Rivest–Shamir–Adleman) is a Public Key Cryptosystem that is widely used for secure data transmission.

The operation includes 4 phases:

  1. Choose two distinct prime numbers of large value.

2. Compute n = p * q

3. Compute Euler’s totient function

4. Find the decryption key d such that d is the multiplicative inverse of e in the class module

In Public Key Cryptography, the key distribution of public keys is done through public key servers. When a person creates a key-pair, they keep one key private and the other, known as the public-key, is uploaded to a server where it can be accessed by anyone.

The message is encrypted using the shared public key. Data encrypted with the public key can only be decrypted with the private key, and data encrypted with the private key can only be decrypted with the public key. Public key encryption is also known as asymmetric encryption.

The receiver decrypts the message using the private key.

Limitation of RSA Encryption Algorithm:

RSA Encryption is a reliable cryptographic algorithm only if the prime numbers are large numbers. If the primes are small then RSA encryption algorithm does not prove to be effective. Similarly, use of prime numbers that are relatively close makes the encryption system weak and obvious.

One of the drawbacks to the RSA encryption algorithm as originally defined is that it leaks a single plaintext bit in every ciphertext. This bit is the Jacobi symbol of the plaintext, and is either “1” or “−1.” Since e is odd it is straightforward to see that J (m/n) =J (m e /n) for all valid RSA plaintexts m.

if a third person (Eve) has sufficient details about Alice’s hardware then she is able to measure the decryption times for several known ciphertexts. In this way Eve can deduce the decryption d easily and quickly.




Student at ITER, BBSR.

Love podcasts or audiobooks? Learn on the go with our new app.

Vulnerability in Active Directory may allow attackers to gain control of Windows Domain Controllers

“The Art of the Possible”

Intro to Etheruem Dapps

AWS Cryptos is coming!

DeconstruCTF 2021 Write-ups

{UPDATE} Millionaire 2019 NO ADS Hack Free Resources Generator

What SSH Hacking Attempts Look Like

The simplest trick to secure your WordPress website

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Swagatika Panda

Swagatika Panda

Student at ITER, BBSR.

More from Medium

2022WorldEarthDay: Turn-about of the Antique — Sloths Deserve to be SDGs Mascot

How Does Christmas Work In The Pokémon World?


Is Belgium doing enough to return looted Congolese artefacts?

Newbies Guide to NFTs