Nexus Encryption Logo
HomeCiphersAbout UsContact

RSA Algorithm Encryption & Decryption Tool

Explore RSA encryption with customizable key sizes and public/private key management.

Key Management

Encrypt/Decrypt

Understanding RSA Encryption

Introduction to RSA

RSA (Rivest–Shamir–Adleman) is a public-key cryptosystem widely used for secure data transmission. It is an asymmetric cryptographic algorithm, meaning it uses two different keys: a public key for encryption and a private key for decryption.

Key Features

  • Asymmetric encryption: Uses separate keys for encryption and decryption
  • Variable key sizes: Typically 1024, 2048, or 4096 bits
  • Based on the mathematical difficulty of factoring large prime numbers
  • Widely used for secure communication, digital signatures, and key exchange

RSA Encryption Process

RSA encryption involves the following steps:

  1. Key generation: Create a public/private key pair
  2. Encryption: Use the recipient's public key to encrypt the message
  3. Decryption: Use the recipient's private key to decrypt the message

RSA Key Generation

RSA key generation involves:

  1. Choose two large prime numbers, p and q
  2. Compute n = p * q
  3. Compute φ(n) = (p-1) * (q-1)
  4. Choose an integer e such that 1 < e < φ(n) and gcd(e, φ(n)) = 1
  5. Compute d to satisfy the congruence relation de ≡ 1 (mod φ(n))
  6. Public key is (n, e), private key is (n, d)

Applications of RSA

RSA is widely used in various applications, including:

  • Secure communication over the internet (HTTPS)
  • Digital signatures for document authentication
  • Secure key exchange in cryptographic protocols
  • Secure email communication (PGP, S/MIME)

Security Considerations

RSA security depends on the difficulty of factoring large numbers. Key considerations include:

  • Key size: Larger keys provide better security but slower performance
  • Proper implementation: Avoid vulnerabilities like padding oracle attacks
  • Key management: Securely store and distribute private keys
  • Quantum computing threat: RSA may be vulnerable to future quantum algorithms

Example: RSA Encryption and Decryption

Here's a simple example of RSA encryption and decryption (using small numbers for illustration):


                            Public key (n, e): (3233, 17)
                            Private key (n, d): (3233, 2753)

                            Plaintext: 123

                            Encryption:
                            C = 123^17 mod 3233 = 855

                            Decryption:
                            M = 855^2753 mod 3233 = 123