The RSA Cryptosystem

  • Christof PaarEmail author
  • Jan Pelzl


After Whitfield Diffie and Martin Hellman introduced public-key cryptography in their landmark 1976 paper [58], a new branch of cryptography suddenly opened up. As a consequence, cryptologists started looking for methods with which public-key encryption could be realized. In 1977, Ronald Rivest, Adi Shamir and Leonard Adleman (cf. Fig. 1) proposed a scheme which became the most widely used asymmetric cryptographic scheme, RSA.


Chinese Remainder Theorem Differential Power Analysis Public Exponent Simple Power Analysis Extended Euclidean Algorithm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  1. 1.Department of Electrical Engineering and Information SciencesRuhr-Universität BochumBochumGermany
  2. 2.Zentrum für IT-Sicherheitescrypt GmbH — Embedded SecurityBochumGermany

Personalised recommendations