- #1
ice109
- 1,714
- 6
I got curious about RSA Encryption after the software signing key for TI-83s got cracked earlier this week and so I'm reading the wiki article about it[RSA]. I'm curious about a step so I'll fill in everyone and then highlight the step I'm not sure about.
Key generation:
1. pick 2 prime numbers p and q
2. compute n = p*q
3. compute the totient t = (p - 1)(q - 1)
4. pick what will be named the exponent e such that 1 < e < t and e and t are coprime
5. pick d such that d*e = 1 ( mod t )
public key is (n,e) private key is (n,d)Encryption:
public key is pre-sent, (n,e). sender uses said public key to compute/send the number/message m like such: c=[itex]m^e[/itex] ( mod n )
Decryption:
m can be recovered as such:
m = [itex]c^d = (m^e)^d=m^{1 mod t} = m^{1 + k*t}=m(m^t)^k=m ( mod n)[/itex]
where the last part is due to euler's theorem about totients.
Fin
the question why everything after key generation is done modulo n? is it to make euler's theorem work out in the end?
Key generation:
1. pick 2 prime numbers p and q
2. compute n = p*q
3. compute the totient t = (p - 1)(q - 1)
4. pick what will be named the exponent e such that 1 < e < t and e and t are coprime
5. pick d such that d*e = 1 ( mod t )
public key is (n,e) private key is (n,d)Encryption:
public key is pre-sent, (n,e). sender uses said public key to compute/send the number/message m like such: c=[itex]m^e[/itex] ( mod n )
Decryption:
m can be recovered as such:
m = [itex]c^d = (m^e)^d=m^{1 mod t} = m^{1 + k*t}=m(m^t)^k=m ( mod n)[/itex]
where the last part is due to euler's theorem about totients.
Fin
the question why everything after key generation is done modulo n? is it to make euler's theorem work out in the end?