What is RSA, and how does it work?
Learn from Cryptography

RSA (Rivest-Shamir-Adleman) is a widely used asymmetric cryptographic algorithm named after its inventors: Ron Rivest, Adi Shamir, and Leonard Adleman. It is fundamental to modern secure communication and digital signatures. Here’s a detailed explanation of RSA and how it works:
Overview
RSA is an asymmetric encryption algorithm, meaning it uses a pair of keys (public and private keys) to encrypt and decrypt data. The public key can be freely distributed and is used to encrypt data, while the private key is kept secret and is used for decryption.
Key Generation
1. Key Generation Process:
- Choose two large prime numbers, \( p \) and \( q \).
- Compute the modulus \( n = p \times q \).
- Compute Euler's totient function \( \phi(n) = (p-1)(q-1) \).
- Select an integer \( e \) such that \( 1 < e < \phi(n) \) and \( \text{gcd}(e, \phi(n)) = 1 \) (e and \( \phi(n) \) are coprime).
- Calculate the modular multiplicative inverse of \( e \) modulo \( \phi(n) \) to find \( d \) (i.e., \( d \) is the decryption exponent such that \( e \cdot d \equiv 1 \ (\text{mod} \ \phi(n)) \)).
The public key is \( (e, n) \) and the private key is \( (d, n) \).
Encryption
2. Encryption Process:
- Sender obtains the recipient's public key \( (e, n) \).
- Represent the plaintext message as an integer \( m \) where \( 0 \leq m < n \).
- Compute the ciphertext \( c \equiv m^e \ (\text{mod} \ n) \).
The sender then transmits \( c \) to the recipient.
Decryption
3. Decryption Process:
- Recipient uses their private key \( (d, n) \).
- Compute the plaintext \( m \equiv c^d \ (\text{mod} \ n) \).
Security
- Key Length: The security of RSA relies on the difficulty of factoring the modulus \( n \) into its prime factors \( p \) and \( q \). Therefore, the security of RSA increases with the length of \( n \).
- Padding: RSA uses padding schemes (e.g., RSA-OAEP, RSA-PSS) to enhance security and prevent attacks like chosen ciphertext attacks.
- Digital Signatures: RSA can also be used for digital signatures by encrypting a hash of the message with the sender's private key, providing authenticity and integrity.
Applications
- Secure Communication: RSA is used in protocols like HTTPS, SSH, and IPsec to secure data transmission over networks.
- Digital Signatures: Used in digital signatures to verify the authenticity and integrity of messages and software.
- Key Exchange: Part of key exchange mechanisms (e.g., in TLS/SSL) to securely negotiate symmetric encryption keys.
Challenges
- Key Management: Securely generating, distributing, and managing RSA keys is crucial to maintaining the security of encrypted data.
- Performance: RSA encryption and decryption are computationally intensive, especially for large key sizes.
RSA remains a cornerstone of modern cryptography due to its mathematical robustness and versatility in securing sensitive data and communications across various applications.