Search. Read. Cite.

Easy to search. Easy to read. Easy to cite with credible sources.

Information Technology Journal

Year: 2013  |  Volume: 12  |  Issue: 9  |  Page No.: 1818 - 1824

Analysis and Research of the RSA Algorithm

NaQi, Wei Wei, Jing Zhang, Wei Wang, Jinwei Zhao, Junhuai Li, Peiyi Shen, Xiaoyan Yin, Xiangrong Xiao and Jie Hu

Abstract

With the continuous development of society and the prevalence of computer and network technology. How to ensure the security of information in the course of transmission have become the most important things for people at present. With this background, we studied how to realize encryption and decryption of the RSA (Initials of Ron Rivest, Adi Shamirh, LenAdleman) encryption technology. This study mainly introduces the application of RSA algorithm in encryption and decryption, mentions the technology of digital signature. Also introduces in the process of implementation of RSA algorithm in Visual Studios environment and operation results. Using this system for encryption and decryption of information, theoretically, good results were obtained in safety and reliability.

Cited References Fulltext