Key generation research of RSA public cryptosystem and Matlab implement

RSA is the asymmetric cryptography system. The security of RSA public key cryptosystem is based on the assumption that factoring of a large modulus is difficult. In RSA if someone can factor modulus into a product of two prime numbers, then the private key is also detected and hence the security of the cryptosystem is broken. So it is quite important to research the selection of prime and derive private key from public key. This paper introduces the basic number theories of RSA cryptosystem and applies t to key algorithm of RSA cryptosystem, such as Euclidean and its extension theorem, square-multiply algorithm and prime number testing. At last, provides a description of Matlab simulation of key algorithm and RSA encryption and decryption. The result shows that the whole simulation took 0.140176s, and solves the problem of key transmission.

[1]  William Stallings,et al.  Cryptography and network security , 1998 .

[2]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .

[3]  Akashi Satoh,et al.  Systematic Design of RSA Processors Based on High-Radix Montgomery Multipliers , 2011, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[4]  M. Dousti,et al.  High Speed RSA Implementation Based on Modified Booth's Technique and Montgomery's Multiplication for FPGA Platform , 2009, 2009 Second International Conference on Advances in Circuits, Electronics and Micro-electronics.

[5]  Martin E. Hellman,et al.  Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.

[6]  Prashant Sharma,et al.  RSA algorithm using modified subset sum cryptosystem , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).

[7]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[8]  Neal R. Wagner,et al.  The Laws of Cryptography with Java Code , 2003 .

[9]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[10]  Ming-Der Shieh,et al.  A New Algorithm for High-Speed Modular Multiplication Design , 2009, IEEE Transactions on Circuits and Systems I: Regular Papers.

[11]  William Stallings,et al.  Cryptography and Network Security (4th Edition) , 2005 .

[12]  Nadia Nedjah,et al.  Three hardware architectures for the binary modular exponentiation: sequential, parallel, and systolic , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[13]  A. E. Cohen,et al.  Architecture Optimizations for the RSA Public Key Cryptosystem: A Tutorial , 2011, IEEE Circuits and Systems Magazine.