Cryptography, Information Theory, and Error-Correction. Aiden A. Bruen

Читать онлайн книгу.

Cryptography, Information Theory, and Error-Correction - Aiden A. Bruen


Скачать книгу
alt="d"/>. Thus, the private key is sometimes defined as the triple left-bracket p comma q comma d right-bracket.

      Another example of the RSA algorithm

      In the example below, we also briefly indicate how more sophisticated number theory can shorten the calculations.

      Remark 3.4

      Note in the above that 461 comma 047 minus 739 is divisible by p minus 1 equals 862.

      In general, suppose a comma u comma v are not divisible by p, u greater-than v and assume that u minus v is divisible by p minus 1. Then a Superscript u minus v Baseline equals a Superscript left-parenthesis p minus 1 right-parenthesis lamda Baseline equals left-parenthesis a Superscript lamda Baseline right-parenthesis Superscript p minus 1 Baseline identical-to 1 left-parenthesis mod p right-parenthesis. Therefore, a Superscript u Baseline equals a Superscript v Baseline left-parenthesis mod p right-parenthesis upon multiplying both sides by a Superscript v Baseline left-parenthesis mod p right-parenthesis.

      Remark 3.5

      Instead of using 461047 as the deciphering index, Bob can calculate that the least common multiple of p minus 1 and q minus 1 is t equals 403 416. Then he can find that the remainder of d prime e when divided by t is 1, where d prime equals 57 631, and use this for a deciphering index instead.