| 
 | 
 | 
A Public-Key Cryptography Algorithm which uses Prime Factorization as the Trapdoor Function. Define
| (1) | 
| (2) | 
| (3) | 
Let the message be converted to a number 
. The sender then makes 
 and 
 public and sends
| (4) | 
| (5) | 
| (6) | 
It is possible to break the cryptosystem by repeated encryption if a unit of 
 has small
Order (Simmons and Norris 1977, Meijer 1996), where 
 is the Ring of
Integers between 0 and 
 under addition and multiplication (mod 
). Meijer (1996) shows that
``almost'' every encryption exponent 
 is safe from breaking using repeated encryption for factors of the form
| (7) | |||
| (8) | 
| (9) | |||
| (10) | 
| (11) | |||
| (12) | 
Using the RSA system, the identity of the sender can be identified as genuine without revealing his private code.
See also Public-Key Cryptography
References
Honsberger, R.  Mathematical Gems III.  Washington, DC: Math. Assoc. Amer., pp. 166-173, 1985.
 
Meijer, A. R. ``Groups, Factoring, and Cryptography.'' Math. Mag. 69, 103-109, 1996.
 
Rivest, R. L. ``Remarks on a Proposed Cryptanalytic Attack on the MIT Public-Key Cryptosystem.'' Cryptologia 2, 62-65, 1978.
 
Rivest, R.; Shamir, A.; and Adleman, L. ``A Method for Obtaining Digital Signatures and Public Key Cryptosystems.''
  Comm. ACM 21, 120-126, 1978.
 
RSA Data Security.
 
Simmons, G. J. and Norris, M. J. ``Preliminary Comments on the MIT Public-Key Cryptosystem.''  Cryptologia 1, 406-414, 1977.
 
  A Security Dynamics Company.  http://www.rsa.com.
| 
 | 
 | 
© 1996-9 Eric W. Weisstein