What is the RSA algorithm?
The word algorithm is considered a variant of algorism , which concerns Arabic numbers and comes from the surname of Arab mathematician named Muhammad Ibn-Musa al-Khwarizmi. In cryptography, the algorithm is a process or procedure that, when followed, creates a specific type of encryption and can be referred to as encryption algorithm . Message encryption is the key to safe transfer or internet messages. There are a number of different encryption algorithms, including Rijndael, Mars, RC6, Serpent and Twicofish, all of which have been submitted as candidates for AES (Advanced Encryption Standard), which is used for safe communication over the Internet. The RSA algorithm is another encryption algorithm used in another encryption system used on the Internet, especially for e-mail.
Ronald L. Rivest, Adi Shamir and Leonard M. Adleman, Members of the Faculty at MIT, invented the highest Shamir-Adleman-Adi rsaalgorithm The RSA orithm has become used in the encryption system of a public key, also known as Cyptography of public keys or PKC. Encryption systems can have one or two keys. PKC is an asymmetric encryption system, which means it has two keys.
Although the formerly known US National Security Agency earlier, public cryptography was invented and published in 1976 by Whitfield Diffie of Sun Microsystems® and Martin Hellman of Stanford University. They came up with a way to prevent the sender from having to include an encryption key with a message as required when encrypting a symmetrical key. It was a great progress because sending the key with the message increased the risk of possible capture and decryption. Since March 2010, the claim that computer scientists at the University of Michigan have cracked the algorithm of the RSA, but it was also emphasized that the method depends on the manipulation of the computer without finding out how deencrypt any message anytime from anywhere in the world.
PKC works in several steps. First, the sender's computer will ask the recipient's computer to provide its public key. If responds, the public key of the receiver - created by the RSA algorithm - is used to encrypt the message. Then the message is sent and when the computer receives a message, the private receiver key is used to decrypt the message. Because there are two keys, a captured message or message that is kidnapped is safe because it cannot be decrypted without a key.