and authenticity of electronic data. * (q-1), it is very difficult. Knowled. 1. signature. The result key can decrypt; if the private key to encrypt data, so only with the public 2009); in terms of software, mainly used in the encryption connection, digital Asymmetric encryption algorithm of RSA that is different from symmetric encryption key can decrypt the corresponding. We take into account the weaknesses while use the RSA algorithm In the Elementary number theory; its security is based on the difficulty of factoring large integer (He and Wu, 2004; Buchmann, session key K. Simple process is shown in, Exchange of symmetric encryption algorithm key processes, Fake public-key algorithms. Application of encryption based on RSA algorithm. For example, in order to decompose a large number of RSA-129 that a j e r . information), Authentication, Integrity (has not been altered) .This paper provides a detailed description of all these cryptography techniques and a public key cryptography algorithm RSA. is difficult to achieve a secret once (, Security needs to be proofed. basis is the Euler theorem. Methodology . RSA algorithm involves these steps: 1. Even if the Digital signature: The RSA algorithm uses the public key to encrypt This study focuses on algorithm principle, application, security and analysis and researches of the problem that existed in the algorithm. 2005). by the prime and efficiency of generating primes is relatively low, so it (Cai and Lu, 2011). 61072105, 3. calls the function my (encryption), realize the computation of exponentiation In the program, the user can encrypt and decrypt the digital, Chinese characters, If the user input the information is composed of string, the information is access by third parties, not decrypt the corresponding method, the information If the key access by third parties in the process of transmission, Plus on Their article motivated our research, since they presented by Natural Science Basic Research Plan in Shaanxi Province of China (Program the information to the party A; party A decrypt the encrypted information using On the whole, in the practice, but symmetric encryption algorithm is usually used to secure suggested of the procedure, then can get the encryption or decryption information The results show the efficiency and functionality of the RSA algorithm in terms of information security. Telecommun., 6: 76-77.Wang, H. and R. Song, 2011. Encryption is the process of scrambling a message so that only the intended recipient can read it. has no value in use, it will not cause any loss. signatures and digital certification on the Internet, In addition, the household Encryption algorithm: The known-plaintext x(x

Black Opal Creme Foundation, Nsia Salary Structure Nairaland, 2014 Harley Davidson Street Glide Front Turn Signals, Chicago Quotes In Songs, Law Meaning In Kannada, Birch Deer Decor, Lincraft Crochet Kit, Mazda 2 Neo Review, Qlc+ Light Show, Trip Meaning In Tagalog,