MHB RSA Explained: Intro for Layman, Number Theory Basics

  • Thread starter Thread starter matqkks
  • Start date Start date
  • Tags Tags
    Layman
AI Thread Summary
The RSA algorithm encrypts numbers using a public key and decrypts them with a private key, relying on the difficulty of factoring the product of two large prime numbers, n = pq. The encryption process is represented as the encrypted number being equal to m raised to the power of the public key modulo n. Decryption reverses this process using the private key. Resources like Wikipedia provide a foundational understanding, detailing how to generate the public and private key pair from primes p and q. The discussion emphasizes the importance of modular arithmetic and suggests exploring the Chinese remainder theorem for further insight.
matqkks
Messages
280
Reaction score
5
I am looking for any resources which explain the RSA algorithm for the layman. I have found a number of sources but they all tend to end with a morass of technical details. This is for a first year undergraduate course in number theory who have covered some basic work on modular arithmetic.
 
Mathematics news on Phys.org
matqkks said:
I am looking for any resources which explain the RSA algorithm for the layman. I have found a number of sources but they all tend to end with a morass of technical details. This is for a first year undergraduate course in number theory who have covered some basic work on modular arithmetic.

Hi matqkks,

It seems to me the explanation here is about as simple as it gets.Long story short, we encrypt numbers $m$ with the public key as:
$$\text{encrypted number} = m^{\text{public key}} \bmod n$$
and we decrypt them with the private key:
$$m = \text{encrypted number}^{\text{private key}} \bmod n$$
where $n = pq$ is the product of 2 large prime numbers.The schema hinges on the fact that it's very difficult to find $p$ and $q$ given $n$.
The article explains how to get a $(\text{public key}, \text{private key})$ pair given $p$ and $q$.
It also means that anyone can encrypt a message, but only someone with access to the $\text{private key}$ can decrypt a message.
 
I agree completely with the previous post. You should read the Wikipedia article. Using the notation there, given an integer x, the encoded x is $x^e\text{ mod}(n)$ The decoding $f$ is such that $ef\equiv1\text{ mod}(\phi(n))$ Then for $x$ prime to $n$, $x^{ef}\equiv x\text{ mod}(n)$. However, it should still work for x's not prime to n. You might try your hand at this. Hint: the Chinese remainder theorem is helpful.
 
Insights auto threads is broken atm, so I'm manually creating these for new Insight articles. In Dirac’s Principles of Quantum Mechanics published in 1930 he introduced a “convenient notation” he referred to as a “delta function” which he treated as a continuum analog to the discrete Kronecker delta. The Kronecker delta is simply the indexed components of the identity operator in matrix algebra Source: https://www.physicsforums.com/insights/what-exactly-is-diracs-delta-function/ by...
Suppose ,instead of the usual x,y coordinate system with an I basis vector along the x -axis and a corresponding j basis vector along the y-axis we instead have a different pair of basis vectors ,call them e and f along their respective axes. I have seen that this is an important subject in maths My question is what physical applications does such a model apply to? I am asking here because I have devoted quite a lot of time in the past to understanding convectors and the dual...
Thread 'Imaginary Pythagoras'
I posted this in the Lame Math thread, but it's got me thinking. Is there any validity to this? Or is it really just a mathematical trick? Naively, I see that i2 + plus 12 does equal zero2. But does this have a meaning? I know one can treat the imaginary number line as just another axis like the reals, but does that mean this does represent a triangle in the complex plane with a hypotenuse of length zero? Ibix offered a rendering of the diagram using what I assume is matrix* notation...
Back
Top