Skip to main content

An Application Example: The RSA Cryptosystem

  • Chapter
Cryptography in C and C++
  • 486 Accesses

Abstract

As we approach the endof our story we would like to investigate the possibility of testing what we have labored over chapter by chapter against a realistic and current example, one that clearly demonstrates the connection between the theme of cryptographic application and the deployment of our programmed functions. We shall make a brief excursion into the principle of asymmetric cryptosystems and then turn our attention to the RSA algorithm as the classic example of such a system, which was published in 1978 by its inventors/discoverers, Ronald Rivest, Adi Shamir, and Leonard Adleman (see [Rive], [Elli]), and which by now has been implemented worldwide.1 The RSA algorithm is patented in the United States of America, but the patent expired on 20 September 2000. Against the free use of the RSA algorithm stood the claims of RSA Security, who possessed rights to the trade name “RSA,” which triggered vehement discussion in connection with work on the standard P1363 [IEEE], with in some cases rather grotesque results, for example, the suggestion of rechristening the RSA procedure “biprime cryptography.” There have also appeared less serious suggestions, such as FRA (former RSA algorithm), RAL (Ron, Adi, Leonard), and QRZ (RSA — 1). Upon expiry of their patent RSA Security weighed in with its opinion:

Clearly, the terms “RSA algorithm,” “RSA public-key algorithm,” “RSA cryptosystem,” and “RSA public-key cryptosystem” are well established in standards and open academic literature. RSA Security does not intend to prohibit the use of these terms by individuals or organizations that are implementing the RSA algorithm (“RSA-Security—Behind the Patent,” September 2000).2

The next question was the obvious one, “Can this be done with ordinary encipherment? Can we produce a secure encrypted message, readable by the authorised recipient without any prior secret exchange of the key etc?” ... I published the existence theorem in 1970.

—J H Ellis, “The Story of Non-Secret Encryption”

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Michael Welschenbach

About this chapter

Cite this chapter

Welschenbach, M. (2001). An Application Example: The RSA Cryptosystem. In: Cryptography in C and C++. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-1157-0_16

Download citation

  • DOI: https://doi.org/10.1007/978-1-4302-1157-0_16

  • Publisher Name: Apress, Berkeley, CA

  • Print ISBN: 978-1-893115-95-8

  • Online ISBN: 978-1-4302-1157-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics