Skip to main content

RSA Public-Key Encryption

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 408 Accesses

Related Concepts

Integer Factoring; OAEP; Rabin

Definition

RSA public-key encryption (due to Rivest, Shamir, and Adleman) is an asymmetric encryption scheme based on the RSA trapdoor one-way permutation, and thus related to integer factoring.

Theory

One-Way Permutations

A one-way function is a function f that anyone can compute efficiently, however inverting f is hard. Such a primitive is the basis of modern cryptography, and relies on the open problem \(\mathcal{P}\) vs. \(\mathcal{N}\mathcal{P}\) (computational complexity). As a consequence, any \(\mathcal{N}\mathcal{P}\)-complete problem should lead to such a one-way function candidate. Unfortunately, \(\mathcal{N}\mathcal{P}\)-complete problems are not so convenient for cryptographic applications, because either they are hard to solve for very large instances only, or very few instances are hard but the problem is easy on average. Furthermore, such a primitive is not enough for public-key encryption.

A trapdoor one-waypermutation...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Bellare M, Rogaway P (1995) Optimal asymmetric encryption–how to encrypt with RSA. In: De Santi A (ed) Advances in cryptology–EUROCRYPT’94. Lecture notes in computer science, vol 950. Springer, Berlin, pp 92–111

    Google Scholar 

  2. Boneh D, Durfee G (2000) Cryptanalysis of RSA with private key d less than N0:292. IEEE Trans Inform Theory 46(4):1339–1349

    MATH  MathSciNet  Google Scholar 

  3. Håstad J (1988) Solving simultaneous modular equations of low degree. SIAM J Comput 17:336–341

    MATH  MathSciNet  Google Scholar 

  4. Miller G (1976) Riemann’s hypothesis and tests for primality. J Comput Syst Sci 13:300–317

    MATH  Google Scholar 

  5. Rackoff C, Simon DR (1992) Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum J (ed) Advances in cryptology–CRYPTO’91. Lecture notes in computer science, vol 576. Springer, Berlin, pp 433–444

    Google Scholar 

  6. Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public key cryptosystems. Commun ACM 21(2):120–126

    MATH  MathSciNet  Google Scholar 

  7. Wiener M (1990) Cryptanalysis of short RSA secret exponents. IEEE Trans Inform Theory 36(3):553–558

    MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Pointcheval, D. (2011). RSA Public-Key Encryption. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_153

Download citation

Publish with us

Policies and ethics