Title Research and Realization of RSA
Abstract
With the rapid development of the Internet, the whole world was tied more and more tightly. This has brought human being society great convenience,at the same time, also brought a series of serious problems in which the information security is the most outstanding one.
RSA is the first quite perfect Public Key Algorithm, Calculate way of RSA from since announcement through the development and tests of more than 20 years, didn't yet find out other blemishes up to now in addition to its speed slightly slowly, therefore the application of the calculate way of RSA is extensive more and more. Enter the 90's, fly along with the calculator network, Internet and Intranet to develop soon, the calculate way of RSA has already is apply to the information safety, transact the automation, E-mail, the electronics auto pay to pay the system, retail the business net, software to distribute automatically, the calculator defends virus and various military system safeties to establish the juice etc. realm. We believe along with the exaltation of the development and calculator soft hardware function of the information society, the calculate way of RSA will get the more extensive application necessarily.
This thesis introduced the meaning of the information safety first, introducing the relevant knowledge and the male key password systems that password learn immediately after, for symmetry encrypted the calculate way to also do the simple study. Connecting down the point discussed the principle of the calculate way of RSA, for the classification of the key, born and such as used for they to carry on the thorough analysis in the procedure. Return the function analysis and safety analysis that the synopsis described the calculate way of RSA in this part. The thesis then is four-part to divide the RSA adds to decrypt the procedure to carry out the process, the realization of the procedure is to use the Visual Studio.Net 2005 development terrace, weave the distance language is a C# language. The procedure imitated the private key of male key of RSA born and keep the process, can carry on encrypt to decrypt to the string and text file. Is how to use for the procedure of also did the elucidation of a synopsis. Analyzed a little bit difficult problem within this design finally and in fact now method.
Key words public-key cryptosystem Algorithm public-key private-key DES RSA encryption algorithm