Table of costs of operations in elliptic curves

From formulasearchengine
Revision as of 12:13, 29 December 2013 by en>Bender235
Jump to navigation Jump to search

Template:Multiple issues

Intuitive Proof

The algorithm is based on a Fermat's little theorem

p prime, a & p coprime.

So, if we choose d such that

i.e.

Then for a message m

So a message that is encrypted by raising m to e can be decrypted by raising the result to d.

In order to provide security, RSA actually calculates

(p, q prime) and then d such that

so

We can then continue to calculate

And likewise for q

Now if and then , p, q coprime.

so

An attacker would need to factor n into p and q in order to determine d, and this is a hard problem.

Note that while an attacker could easily calculate f as

that

because n is not prime.