<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://wiki.cas.mcmaster.ca/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Holtzmt&amp;title=Special%3AContributions</id>
		<title>Computing and Software Wiki - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Holtzmt&amp;title=Special%3AContributions"/>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Special:Contributions/Holtzmt"/>
		<updated>2026-04-11T19:14:18Z</updated>
		<subtitle>From Computing and Software Wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T18:53:34Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;/* See Also */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.  Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 1''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
The two keys are a tuple.  The public key consists of the Public Key Exponent, and the Modulous, (e,k).  The Private Key consists of the Private Key Exponent, and again, the Modulous, (d,k).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
Person A wants to send a message to Person B.  Person B requests person A's Public key, (e,k)&lt;br /&gt;
&lt;br /&gt;
The message to be sent is then turned into a number, ''m'', an integer between ''0'' and ''k''.  The encrypted ''c'' message can then be calculated by ''c = (m^e)(mod k)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Decryption===&lt;br /&gt;
&lt;br /&gt;
Person B wants to decrypt a message send from Person A.  Person B uses their own private key (d,k) to decrypt the message in the following way.  m = (c^d)(mod k)&lt;br /&gt;
&lt;br /&gt;
==Example==&lt;br /&gt;
&lt;br /&gt;
1. choose 2 prime numbers.  For examples sake i=17, j=3&lt;br /&gt;
&lt;br /&gt;
2. compute k=ij, k = 17*3 = 51&lt;br /&gt;
&lt;br /&gt;
3. compute T(k)=(i-1)*(j-1), T(k) = (17-1)*(3-1) = 10*4 = 32&lt;br /&gt;
&lt;br /&gt;
4. Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].   &lt;br /&gt;
&lt;br /&gt;
Choose ''e'' = 3&lt;br /&gt;
&lt;br /&gt;
5. Compute d such that 3*d = 1 mod 32, d = 11 such that 3*11 = 1 mod 32&lt;br /&gt;
&lt;br /&gt;
6. Public Key is (k,e), Private Key is (k,d), Public Key = (51, 3), Private Key = (51, 11) &lt;br /&gt;
&lt;br /&gt;
7. Encrypt message using Private Key with ''c = ((m^e)mod k)'' .  Assume a message m=22  cipher text ''c = ((m^e)mod k) = 22^3 mod 51 = 10648 mod 51 = 40 ''&lt;br /&gt;
&lt;br /&gt;
8. Decrypt cipher text using Private Key with ''m' = ((c^d) mod k)''.  Decrypted message m’ = ((40^11) mod 51) = 22&lt;br /&gt;
&lt;br /&gt;
==Digital Signing==&lt;br /&gt;
&lt;br /&gt;
Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.  Thus, Digital Signing is accomplished in the following way.&lt;br /&gt;
&lt;br /&gt;
Person B wishes to send an encrypted message to Person A&lt;br /&gt;
&lt;br /&gt;
1.  The two parties exchange public keys.&lt;br /&gt;
&lt;br /&gt;
2.  Person B Encrypts the message with their own Private Key.&lt;br /&gt;
&lt;br /&gt;
3.  Person B then Encrypts the message again with Person A's Public Key, and sends the message to Person A.&lt;br /&gt;
&lt;br /&gt;
4.  Person A recieves the message, and decrypts it once with their own private key, and then again with Person &lt;br /&gt;
B's Public Key.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the message was encrypted with Person A's public key, only Person A can decrypt the message with their private key.  Since the message was also decrypted with Person B's public key, Person A also knows that the message must have been encrypted with Person B's Public key verifying the source of the message.&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
The algorithm was first publicized in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.  The three worked at MIT at the time.  RSA stands for Rivest, Shamir, and Adleman.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*  Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, ''Introduction to Algorithms'', 2nd Edition,  MIT Press and McGraw-Hill, 2001, isbn  0-262-03293-7, pp.881–887&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*http://en.wikipedia.org/wiki/RSA&lt;br /&gt;
*http://en.wikipedia.org/wiki/Public-key_cryptography&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*http://imps.mcmaster.ca/courses/SE-4C03-09/project/wiki-pages.html&lt;br /&gt;
*http://www.cas.mcmaster.ca/wiki/index.php/Public_Key_Encryption_Algorithms&lt;br /&gt;
*http://www.cas.mcmaster.ca/wiki/index.php/Public_Key_Authentication&lt;br /&gt;
*http://www.cas.mcmaster.ca/wiki/index.php/Steganography_and_Digital_Watermarking&lt;br /&gt;
*http://www.cas.mcmaster.ca/wiki/index.php/Data_Encryption_for_Storage_Devices&lt;br /&gt;
--[[User:Holtzmt|Holtzmt]] 14:53, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T18:48:22Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;/* Example */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.  Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 1''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
The two keys are a tuple.  The public key consists of the Public Key Exponent, and the Modulous, (e,k).  The Private Key consists of the Private Key Exponent, and again, the Modulous, (d,k).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
Person A wants to send a message to Person B.  Person B requests person A's Public key, (e,k)&lt;br /&gt;
&lt;br /&gt;
The message to be sent is then turned into a number, ''m'', an integer between ''0'' and ''k''.  The encrypted ''c'' message can then be calculated by ''c = (m^e)(mod k)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Decryption===&lt;br /&gt;
&lt;br /&gt;
Person B wants to decrypt a message send from Person A.  Person B uses their own private key (d,k) to decrypt the message in the following way.  m = (c^d)(mod k)&lt;br /&gt;
&lt;br /&gt;
==Example==&lt;br /&gt;
&lt;br /&gt;
1. choose 2 prime numbers.  For examples sake i=17, j=3&lt;br /&gt;
&lt;br /&gt;
2. compute k=ij, k = 17*3 = 51&lt;br /&gt;
&lt;br /&gt;
3. compute T(k)=(i-1)*(j-1), T(k) = (17-1)*(3-1) = 10*4 = 32&lt;br /&gt;
&lt;br /&gt;
4. Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].   &lt;br /&gt;
&lt;br /&gt;
Choose ''e'' = 3&lt;br /&gt;
&lt;br /&gt;
5. Compute d such that 3*d = 1 mod 32, d = 11 such that 3*11 = 1 mod 32&lt;br /&gt;
&lt;br /&gt;
6. Public Key is (k,e), Private Key is (k,d), Public Key = (51, 3), Private Key = (51, 11) &lt;br /&gt;
&lt;br /&gt;
7. Encrypt message using Private Key with ''c = ((m^e)mod k)'' .  Assume a message m=22  cipher text ''c = ((m^e)mod k) = 22^3 mod 51 = 10648 mod 51 = 40 ''&lt;br /&gt;
&lt;br /&gt;
8. Decrypt cipher text using Private Key with ''m' = ((c^d) mod k)''.  Decrypted message m’ = ((40^11) mod 51) = 22&lt;br /&gt;
&lt;br /&gt;
==Digital Signing==&lt;br /&gt;
&lt;br /&gt;
Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.  Thus, Digital Signing is accomplished in the following way.&lt;br /&gt;
&lt;br /&gt;
Person B wishes to send an encrypted message to Person A&lt;br /&gt;
&lt;br /&gt;
1.  The two parties exchange public keys.&lt;br /&gt;
&lt;br /&gt;
2.  Person B Encrypts the message with their own Private Key.&lt;br /&gt;
&lt;br /&gt;
3.  Person B then Encrypts the message again with Person A's Public Key, and sends the message to Person A.&lt;br /&gt;
&lt;br /&gt;
4.  Person A recieves the message, and decrypts it once with their own private key, and then again with Person &lt;br /&gt;
B's Public Key.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the message was encrypted with Person A's public key, only Person A can decrypt the message with their private key.  Since the message was also decrypted with Person B's public key, Person A also knows that the message must have been encrypted with Person B's Public key verifying the source of the message.&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
The algorithm was first publicized in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.  The three worked at MIT at the time.  RSA stands for Rivest, Shamir, and Adleman.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*  Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, ''Introduction to Algorithms'', 2nd Edition,  MIT Press and McGraw-Hill, 2001, isbn  0-262-03293-7, pp.881–887&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*http://en.wikipedia.org/wiki/RSA&lt;br /&gt;
*http://en.wikipedia.org/wiki/Public-key_cryptography&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*http://imps.mcmaster.ca/courses/SE-4C03-09/project/wiki-pages.html&lt;br /&gt;
*http://www.cas.mcmaster.ca/wiki/index.php/Public_Key_Encryption_Algorithms&lt;br /&gt;
*http://www.cas.mcmaster.ca/wiki/index.php/Public_Key_Authentication&lt;br /&gt;
*http://www.cas.mcmaster.ca/wiki/index.php/Steganography_and_Digital_Watermarking&lt;br /&gt;
*http://www.cas.mcmaster.ca/wiki/index.php/Data_Encryption_for_Storage_Devices&lt;br /&gt;
&lt;br /&gt;
--[[User:Holtzmt|Holtzmt]] 14:46, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T18:47:38Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;/* Example */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.  Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 1''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
The two keys are a tuple.  The public key consists of the Public Key Exponent, and the Modulous, (e,k).  The Private Key consists of the Private Key Exponent, and again, the Modulous, (d,k).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
Person A wants to send a message to Person B.  Person B requests person A's Public key, (e,k)&lt;br /&gt;
&lt;br /&gt;
The message to be sent is then turned into a number, ''m'', an integer between ''0'' and ''k''.  The encrypted ''c'' message can then be calculated by ''c = (m^e)(mod k)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Decryption===&lt;br /&gt;
&lt;br /&gt;
Person B wants to decrypt a message send from Person A.  Person B uses their own private key (d,k) to decrypt the message in the following way.  m = (c^d)(mod k)&lt;br /&gt;
&lt;br /&gt;
==Example==&lt;br /&gt;
&lt;br /&gt;
1. choose 2 prime numbers.  For examples sake i=17, j=3&lt;br /&gt;
&lt;br /&gt;
2. compute k=ij, k = 17*3 = 51&lt;br /&gt;
&lt;br /&gt;
3. compute T(k)=(i-1)*(j-1), T(k) = (17-1)*(3-1) = 10*4 = 32&lt;br /&gt;
&lt;br /&gt;
4. Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].   &lt;br /&gt;
&lt;br /&gt;
Choose ''e'' = 3&lt;br /&gt;
&lt;br /&gt;
5. Compute d such that 3*d = 1 mod 32, d = 11 such that 3*11 = 1 mod 32&lt;br /&gt;
&lt;br /&gt;
6. Public Key is (k,e), Private Key is (k,d), Public Key = (51, 3), Private Key = (51, 11) &lt;br /&gt;
&lt;br /&gt;
7. Encrypt message using Private Key with ''c = (m^e(mod k)'' .  Assume a message m=22  cipher text ''c = ((m^e)mod k) = 22^3 mod 51 = 10648 mod 51 = 40 ''&lt;br /&gt;
&lt;br /&gt;
8. Decrypt cipher text using Private Key with ''m' = ((c^d) mod k)''.  Decrypted message m’ = 40^11 mod 51 = 22&lt;br /&gt;
&lt;br /&gt;
==Digital Signing==&lt;br /&gt;
&lt;br /&gt;
Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.  Thus, Digital Signing is accomplished in the following way.&lt;br /&gt;
&lt;br /&gt;
Person B wishes to send an encrypted message to Person A&lt;br /&gt;
&lt;br /&gt;
1.  The two parties exchange public keys.&lt;br /&gt;
&lt;br /&gt;
2.  Person B Encrypts the message with their own Private Key.&lt;br /&gt;
&lt;br /&gt;
3.  Person B then Encrypts the message again with Person A's Public Key, and sends the message to Person A.&lt;br /&gt;
&lt;br /&gt;
4.  Person A recieves the message, and decrypts it once with their own private key, and then again with Person &lt;br /&gt;
B's Public Key.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the message was encrypted with Person A's public key, only Person A can decrypt the message with their private key.  Since the message was also decrypted with Person B's public key, Person A also knows that the message must have been encrypted with Person B's Public key verifying the source of the message.&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
The algorithm was first publicized in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.  The three worked at MIT at the time.  RSA stands for Rivest, Shamir, and Adleman.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*  Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, ''Introduction to Algorithms'', 2nd Edition,  MIT Press and McGraw-Hill, 2001, isbn  0-262-03293-7, pp.881–887&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*http://en.wikipedia.org/wiki/RSA&lt;br /&gt;
*http://en.wikipedia.org/wiki/Public-key_cryptography&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*http://imps.mcmaster.ca/courses/SE-4C03-09/project/wiki-pages.html&lt;br /&gt;
*http://www.cas.mcmaster.ca/wiki/index.php/Public_Key_Encryption_Algorithms&lt;br /&gt;
*http://www.cas.mcmaster.ca/wiki/index.php/Public_Key_Authentication&lt;br /&gt;
*http://www.cas.mcmaster.ca/wiki/index.php/Steganography_and_Digital_Watermarking&lt;br /&gt;
*http://www.cas.mcmaster.ca/wiki/index.php/Data_Encryption_for_Storage_Devices&lt;br /&gt;
&lt;br /&gt;
--[[User:Holtzmt|Holtzmt]] 14:46, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T18:46:06Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;/* See Also */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.  Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 1''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
The two keys are a tuple.  The public key consists of the Public Key Exponent, and the Modulous, (e,k).  The Private Key consists of the Private Key Exponent, and again, the Modulous, (d,k).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
Person A wants to send a message to Person B.  Person B requests person A's Public key, (e,k)&lt;br /&gt;
&lt;br /&gt;
The message to be sent is then turned into a number, ''m'', an integer between ''0'' and ''k''.  The encrypted ''c'' message can then be calculated by ''c = (m^e)(mod k)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Decryption===&lt;br /&gt;
&lt;br /&gt;
Person B wants to decrypt a message send from Person A.  Person B uses their own private key (d,k) to decrypt the message in the following way.  m = (c^d)(mod k)&lt;br /&gt;
&lt;br /&gt;
==Example==&lt;br /&gt;
&lt;br /&gt;
1. choose 2 prime numbers.  For examples sake i=17, j=3&lt;br /&gt;
&lt;br /&gt;
2. compute k=ij, k = 17*3 = 51&lt;br /&gt;
&lt;br /&gt;
3. compute T(k)=(i-1)*(j-1), T(k) = (17-1)*(3-1) = 10*4 = 32&lt;br /&gt;
&lt;br /&gt;
4. Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].   &lt;br /&gt;
&lt;br /&gt;
Choose ''e'' = 3&lt;br /&gt;
&lt;br /&gt;
5. Compute d such that 5*d = 1 mod 32, d = 11 such that 3*11 = 1 mod 32&lt;br /&gt;
&lt;br /&gt;
6. Public Key is (T(k),e), Private Key is (T(k),d), Public Key = (51, 3), Private Key = (51, 11) &lt;br /&gt;
&lt;br /&gt;
7. Encrypt message using Private Key with ''c = (m^e(mod T(k)))'' .  Assume a message m=22  cipher text ''c = ((m^e)mod T(k)) = 22^3 mod 51 = 10648 mod 51 = 40 ''&lt;br /&gt;
&lt;br /&gt;
8. Decrypt cipher text using Private Key with ''m' = ((c^d) mod T(k))''.  Decrypted message m’ = 40^11 mod 51 = 22&lt;br /&gt;
&lt;br /&gt;
==Digital Signing==&lt;br /&gt;
&lt;br /&gt;
Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.  Thus, Digital Signing is accomplished in the following way.&lt;br /&gt;
&lt;br /&gt;
Person B wishes to send an encrypted message to Person A&lt;br /&gt;
&lt;br /&gt;
1.  The two parties exchange public keys.&lt;br /&gt;
&lt;br /&gt;
2.  Person B Encrypts the message with their own Private Key.&lt;br /&gt;
&lt;br /&gt;
3.  Person B then Encrypts the message again with Person A's Public Key, and sends the message to Person A.&lt;br /&gt;
&lt;br /&gt;
4.  Person A recieves the message, and decrypts it once with their own private key, and then again with Person &lt;br /&gt;
B's Public Key.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the message was encrypted with Person A's public key, only Person A can decrypt the message with their private key.  Since the message was also decrypted with Person B's public key, Person A also knows that the message must have been encrypted with Person B's Public key verifying the source of the message.&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
The algorithm was first publicized in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.  The three worked at MIT at the time.  RSA stands for Rivest, Shamir, and Adleman.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*  Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, ''Introduction to Algorithms'', 2nd Edition,  MIT Press and McGraw-Hill, 2001, isbn  0-262-03293-7, pp.881–887&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*http://en.wikipedia.org/wiki/RSA&lt;br /&gt;
*http://en.wikipedia.org/wiki/Public-key_cryptography&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*http://imps.mcmaster.ca/courses/SE-4C03-09/project/wiki-pages.html&lt;br /&gt;
*http://www.cas.mcmaster.ca/wiki/index.php/Public_Key_Encryption_Algorithms&lt;br /&gt;
*http://www.cas.mcmaster.ca/wiki/index.php/Public_Key_Authentication&lt;br /&gt;
*http://www.cas.mcmaster.ca/wiki/index.php/Steganography_and_Digital_Watermarking&lt;br /&gt;
*http://www.cas.mcmaster.ca/wiki/index.php/Data_Encryption_for_Storage_Devices&lt;br /&gt;
&lt;br /&gt;
--[[User:Holtzmt|Holtzmt]] 14:46, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T18:40:09Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;/* Example */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.  Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 1''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
The two keys are a tuple.  The public key consists of the Public Key Exponent, and the Modulous, (e,k).  The Private Key consists of the Private Key Exponent, and again, the Modulous, (d,k).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
Person A wants to send a message to Person B.  Person B requests person A's Public key, (e,k)&lt;br /&gt;
&lt;br /&gt;
The message to be sent is then turned into a number, ''m'', an integer between ''0'' and ''k''.  The encrypted ''c'' message can then be calculated by ''c = (m^e)(mod k)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Decryption===&lt;br /&gt;
&lt;br /&gt;
Person B wants to decrypt a message send from Person A.  Person B uses their own private key (d,k) to decrypt the message in the following way.  m = (c^d)(mod k)&lt;br /&gt;
&lt;br /&gt;
==Example==&lt;br /&gt;
&lt;br /&gt;
1. choose 2 prime numbers.  For examples sake i=17, j=3&lt;br /&gt;
&lt;br /&gt;
2. compute k=ij, k = 17*3 = 51&lt;br /&gt;
&lt;br /&gt;
3. compute T(k)=(i-1)*(j-1), T(k) = (17-1)*(3-1) = 10*4 = 32&lt;br /&gt;
&lt;br /&gt;
4. Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].   &lt;br /&gt;
&lt;br /&gt;
Choose ''e'' = 3&lt;br /&gt;
&lt;br /&gt;
5. Compute d such that 5*d = 1 mod 32, d = 11 such that 3*11 = 1 mod 32&lt;br /&gt;
&lt;br /&gt;
6. Public Key is (T(k),e), Private Key is (T(k),d), Public Key = (51, 3), Private Key = (51, 11) &lt;br /&gt;
&lt;br /&gt;
7. Encrypt message using Private Key with ''c = (m^e(mod T(k)))'' .  Assume a message m=22  cipher text ''c = ((m^e)mod T(k)) = 22^3 mod 51 = 10648 mod 51 = 40 ''&lt;br /&gt;
&lt;br /&gt;
8. Decrypt cipher text using Private Key with ''m' = ((c^d) mod T(k))''.  Decrypted message m’ = 40^11 mod 51 = 22&lt;br /&gt;
&lt;br /&gt;
==Digital Signing==&lt;br /&gt;
&lt;br /&gt;
Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.  Thus, Digital Signing is accomplished in the following way.&lt;br /&gt;
&lt;br /&gt;
Person B wishes to send an encrypted message to Person A&lt;br /&gt;
&lt;br /&gt;
1.  The two parties exchange public keys.&lt;br /&gt;
&lt;br /&gt;
2.  Person B Encrypts the message with their own Private Key.&lt;br /&gt;
&lt;br /&gt;
3.  Person B then Encrypts the message again with Person A's Public Key, and sends the message to Person A.&lt;br /&gt;
&lt;br /&gt;
4.  Person A recieves the message, and decrypts it once with their own private key, and then again with Person &lt;br /&gt;
B's Public Key.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the message was encrypted with Person A's public key, only Person A can decrypt the message with their private key.  Since the message was also decrypted with Person B's public key, Person A also knows that the message must have been encrypted with Person B's Public key verifying the source of the message.&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
The algorithm was first publicized in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.  The three worked at MIT at the time.  RSA stands for Rivest, Shamir, and Adleman.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*  Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, ''Introduction to Algorithms'', 2nd Edition,  MIT Press and McGraw-Hill, 2001, isbn  0-262-03293-7, pp.881–887&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*http://en.wikipedia.org/wiki/RSA&lt;br /&gt;
*http://en.wikipedia.org/wiki/Public-key_cryptography&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*http://imps.mcmaster.ca/courses/SE-4C03-09/project/wiki-pages.html&lt;br /&gt;
--[[User:Holtzmt|Holtzmt]] 13:16, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T18:38:51Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;/* Example */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.  Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 1''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
The two keys are a tuple.  The public key consists of the Public Key Exponent, and the Modulous, (e,k).  The Private Key consists of the Private Key Exponent, and again, the Modulous, (d,k).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
Person A wants to send a message to Person B.  Person B requests person A's Public key, (e,k)&lt;br /&gt;
&lt;br /&gt;
The message to be sent is then turned into a number, ''m'', an integer between ''0'' and ''k''.  The encrypted ''c'' message can then be calculated by ''c = (m^e)(mod k)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Decryption===&lt;br /&gt;
&lt;br /&gt;
Person B wants to decrypt a message send from Person A.  Person B uses their own private key (d,k) to decrypt the message in the following way.  m = (c^d)(mod k)&lt;br /&gt;
&lt;br /&gt;
==Example==&lt;br /&gt;
&lt;br /&gt;
1. choose 2 prime numbers.  For examples sake i=17, j=3&lt;br /&gt;
&lt;br /&gt;
2. compute k=ij, k = 17*3 = 51&lt;br /&gt;
&lt;br /&gt;
3. compute T(k)=(i-1)*(j-1), T(k) = (17-1)*(3-1) = 10*4 = 32&lt;br /&gt;
&lt;br /&gt;
4. Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].   &lt;br /&gt;
&lt;br /&gt;
Choose ''e'' = 3&lt;br /&gt;
&lt;br /&gt;
5. compute d such that 5*d = 1 mod 32, d = 11 such that 3*11 = 1 mod 32&lt;br /&gt;
&lt;br /&gt;
6. public key is (T(k),e), private key is (T(k),d), Public Key = (51, 3), Private Key = (51, 11) &lt;br /&gt;
&lt;br /&gt;
7. Encrypt message using Private Key with ''c = (m^e(mod k))'' .  Assume a message m=22  cipher text ''c = ((m^e)mod k) = 22^3 mod 51 = 10648 mod 51 = 40 ''&lt;br /&gt;
&lt;br /&gt;
8. Decrypt cipher text using Private Key with ''m' = ((c^d) mod k)''.  Decrypted message m’ = 40^11 mod 51 = 22&lt;br /&gt;
&lt;br /&gt;
==Digital Signing==&lt;br /&gt;
&lt;br /&gt;
Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.  Thus, Digital Signing is accomplished in the following way.&lt;br /&gt;
&lt;br /&gt;
Person B wishes to send an encrypted message to Person A&lt;br /&gt;
&lt;br /&gt;
1.  The two parties exchange public keys.&lt;br /&gt;
&lt;br /&gt;
2.  Person B Encrypts the message with their own Private Key.&lt;br /&gt;
&lt;br /&gt;
3.  Person B then Encrypts the message again with Person A's Public Key, and sends the message to Person A.&lt;br /&gt;
&lt;br /&gt;
4.  Person A recieves the message, and decrypts it once with their own private key, and then again with Person &lt;br /&gt;
B's Public Key.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the message was encrypted with Person A's public key, only Person A can decrypt the message with their private key.  Since the message was also decrypted with Person B's public key, Person A also knows that the message must have been encrypted with Person B's Public key verifying the source of the message.&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
The algorithm was first publicized in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.  The three worked at MIT at the time.  RSA stands for Rivest, Shamir, and Adleman.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*  Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, ''Introduction to Algorithms'', 2nd Edition,  MIT Press and McGraw-Hill, 2001, isbn  0-262-03293-7, pp.881–887&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*http://en.wikipedia.org/wiki/RSA&lt;br /&gt;
*http://en.wikipedia.org/wiki/Public-key_cryptography&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*http://imps.mcmaster.ca/courses/SE-4C03-09/project/wiki-pages.html&lt;br /&gt;
--[[User:Holtzmt|Holtzmt]] 13:16, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T18:38:35Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;/* Example */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.  Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 1''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
The two keys are a tuple.  The public key consists of the Public Key Exponent, and the Modulous, (e,k).  The Private Key consists of the Private Key Exponent, and again, the Modulous, (d,k).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
Person A wants to send a message to Person B.  Person B requests person A's Public key, (e,k)&lt;br /&gt;
&lt;br /&gt;
The message to be sent is then turned into a number, ''m'', an integer between ''0'' and ''k''.  The encrypted ''c'' message can then be calculated by ''c = (m^e)(mod k)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Decryption===&lt;br /&gt;
&lt;br /&gt;
Person B wants to decrypt a message send from Person A.  Person B uses their own private key (d,k) to decrypt the message in the following way.  m = (c^d)(mod k)&lt;br /&gt;
&lt;br /&gt;
==Example==&lt;br /&gt;
&lt;br /&gt;
1. choose 2 prime numbers.  For examples sake i=17, j=3&lt;br /&gt;
&lt;br /&gt;
2. compute k=ij, k = 17*3 = 51&lt;br /&gt;
&lt;br /&gt;
3. compute T(k)=(i-1)*(j-1), T(k) = (17-1)*(3-1) = 10*4 = 32&lt;br /&gt;
&lt;br /&gt;
4. Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].   &lt;br /&gt;
&lt;br /&gt;
Choose ''e'' = 3&lt;br /&gt;
&lt;br /&gt;
5. compute d such that 5*d = 1 mod 32, d = 11 such that 3*11 = 1 mod 32&lt;br /&gt;
&lt;br /&gt;
6. public key is (T(k),e), private key is (T(k),d), Public Key = (51, 3), Private Key = (51, 11) &lt;br /&gt;
&lt;br /&gt;
7. Encrypt message using Private Key with ''c = (m^e)(mod k)'' .  Assume a message m=22  cipher text ''c = ((m^e)mod k) = 22^3 mod 51 = 10648 mod 51 = 40 ''&lt;br /&gt;
&lt;br /&gt;
8. Decrypt cipher text using Private Key with ''m' = ((c^d) mod k)''.  Decrypted message m’ = 40^11 mod 51 = 22&lt;br /&gt;
&lt;br /&gt;
==Digital Signing==&lt;br /&gt;
&lt;br /&gt;
Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.  Thus, Digital Signing is accomplished in the following way.&lt;br /&gt;
&lt;br /&gt;
Person B wishes to send an encrypted message to Person A&lt;br /&gt;
&lt;br /&gt;
1.  The two parties exchange public keys.&lt;br /&gt;
&lt;br /&gt;
2.  Person B Encrypts the message with their own Private Key.&lt;br /&gt;
&lt;br /&gt;
3.  Person B then Encrypts the message again with Person A's Public Key, and sends the message to Person A.&lt;br /&gt;
&lt;br /&gt;
4.  Person A recieves the message, and decrypts it once with their own private key, and then again with Person &lt;br /&gt;
B's Public Key.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the message was encrypted with Person A's public key, only Person A can decrypt the message with their private key.  Since the message was also decrypted with Person B's public key, Person A also knows that the message must have been encrypted with Person B's Public key verifying the source of the message.&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
The algorithm was first publicized in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.  The three worked at MIT at the time.  RSA stands for Rivest, Shamir, and Adleman.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*  Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, ''Introduction to Algorithms'', 2nd Edition,  MIT Press and McGraw-Hill, 2001, isbn  0-262-03293-7, pp.881–887&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*http://en.wikipedia.org/wiki/RSA&lt;br /&gt;
*http://en.wikipedia.org/wiki/Public-key_cryptography&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*http://imps.mcmaster.ca/courses/SE-4C03-09/project/wiki-pages.html&lt;br /&gt;
--[[User:Holtzmt|Holtzmt]] 13:16, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T18:37:37Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;/* Example */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.  Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 1''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
The two keys are a tuple.  The public key consists of the Public Key Exponent, and the Modulous, (e,k).  The Private Key consists of the Private Key Exponent, and again, the Modulous, (d,k).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
Person A wants to send a message to Person B.  Person B requests person A's Public key, (e,k)&lt;br /&gt;
&lt;br /&gt;
The message to be sent is then turned into a number, ''m'', an integer between ''0'' and ''k''.  The encrypted ''c'' message can then be calculated by ''c = (m^e)(mod k)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Decryption===&lt;br /&gt;
&lt;br /&gt;
Person B wants to decrypt a message send from Person A.  Person B uses their own private key (d,k) to decrypt the message in the following way.  m = (c^d)(mod k)&lt;br /&gt;
&lt;br /&gt;
==Example==&lt;br /&gt;
&lt;br /&gt;
1. choose 2 prime numbers.  For examples sake i=17, j=3&lt;br /&gt;
&lt;br /&gt;
2. compute k=ij&lt;br /&gt;
&lt;br /&gt;
k = 17*3 = 51&lt;br /&gt;
&lt;br /&gt;
3. compute T(k)=(i-1)*(j-1)&lt;br /&gt;
&lt;br /&gt;
T(k) = (17-1)*(3-1) = 10*4 = 32&lt;br /&gt;
&lt;br /&gt;
4. Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].   &lt;br /&gt;
&lt;br /&gt;
Choose ''e'' = 3&lt;br /&gt;
&lt;br /&gt;
5. compute d such that 5*d = 1 mod 32&lt;br /&gt;
&lt;br /&gt;
d = 11 such that 3*11 = 1 mod 32&lt;br /&gt;
&lt;br /&gt;
6. public key is (T(k),e), private key is (T(k),d) &lt;br /&gt;
&lt;br /&gt;
Public Key = (51, 3), Private Key = (51, 11) &lt;br /&gt;
&lt;br /&gt;
7. Encrypt message using Private Key with ''c = (m^e)(mod k)'' &lt;br /&gt;
&lt;br /&gt;
Assume a message m=22  cipher text ''c = ((m^e)mod k) = 22^3 mod 51 = 10648 mod 51 = 40 ''&lt;br /&gt;
&lt;br /&gt;
8. Decrypt cipher text using Private Key with ''m' = ((c^d) mod k)'' &lt;br /&gt;
&lt;br /&gt;
Decrypted message m’ = 40^11 mod 51 = 22&lt;br /&gt;
&lt;br /&gt;
==Digital Signing==&lt;br /&gt;
&lt;br /&gt;
Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.  Thus, Digital Signing is accomplished in the following way.&lt;br /&gt;
&lt;br /&gt;
Person B wishes to send an encrypted message to Person A&lt;br /&gt;
&lt;br /&gt;
1.  The two parties exchange public keys.&lt;br /&gt;
&lt;br /&gt;
2.  Person B Encrypts the message with their own Private Key.&lt;br /&gt;
&lt;br /&gt;
3.  Person B then Encrypts the message again with Person A's Public Key, and sends the message to Person A.&lt;br /&gt;
&lt;br /&gt;
4.  Person A recieves the message, and decrypts it once with their own private key, and then again with Person &lt;br /&gt;
B's Public Key.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the message was encrypted with Person A's public key, only Person A can decrypt the message with their private key.  Since the message was also decrypted with Person B's public key, Person A also knows that the message must have been encrypted with Person B's Public key verifying the source of the message.&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
The algorithm was first publicized in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.  The three worked at MIT at the time.  RSA stands for Rivest, Shamir, and Adleman.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*  Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, ''Introduction to Algorithms'', 2nd Edition,  MIT Press and McGraw-Hill, 2001, isbn  0-262-03293-7, pp.881–887&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*http://en.wikipedia.org/wiki/RSA&lt;br /&gt;
*http://en.wikipedia.org/wiki/Public-key_cryptography&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*http://imps.mcmaster.ca/courses/SE-4C03-09/project/wiki-pages.html&lt;br /&gt;
--[[User:Holtzmt|Holtzmt]] 13:16, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T18:23:01Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.  Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 1''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
The two keys are a tuple.  The public key consists of the Public Key Exponent, and the Modulous, (e,k).  The Private Key consists of the Private Key Exponent, and again, the Modulous, (d,k).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
Person A wants to send a message to Person B.  Person B requests person A's Public key, (e,k)&lt;br /&gt;
&lt;br /&gt;
The message to be sent is then turned into a number, ''m'', an integer between ''0'' and ''k''.  The encrypted ''c'' message can then be calculated by ''c = (m^e)(mod k)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Decryption===&lt;br /&gt;
&lt;br /&gt;
Person B wants to decrypt a message send from Person A.  Person B uses their own private key (d,k) to decrypt the message in the following way.  m = (c^d)(mod k)&lt;br /&gt;
&lt;br /&gt;
==Example==&lt;br /&gt;
&lt;br /&gt;
1. choose 2 prime numbers.  For examples sake i=11, j=5&lt;br /&gt;
&lt;br /&gt;
2. compute k=ij&lt;br /&gt;
&lt;br /&gt;
k = 11*5 = 55&lt;br /&gt;
&lt;br /&gt;
3. compute T(k)=(i-1)*(j-1)&lt;br /&gt;
&lt;br /&gt;
T(k) = (11-1)*(5-1) = 10*4 = 40 &lt;br /&gt;
&lt;br /&gt;
4. Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].   &lt;br /&gt;
&lt;br /&gt;
Choose ''e'' = 3&lt;br /&gt;
&lt;br /&gt;
5. compute d such that 3*d = 1 mod 40&lt;br /&gt;
&lt;br /&gt;
d = 13 such that 3*13 = 1 mod 40 &lt;br /&gt;
&lt;br /&gt;
6. public key is (k,e), private key is (k,d) &lt;br /&gt;
&lt;br /&gt;
Private Key = (50, 3), SK= (50, 13) &lt;br /&gt;
&lt;br /&gt;
7. Encrypt message using Private Key with ''c = (m^e)(mod k)'' &lt;br /&gt;
&lt;br /&gt;
Assume a message M=10  cipher text ''''c = (m^e)(mod k)'' = 10^3 mod 50 = 100 mod 33 =13 &lt;br /&gt;
&lt;br /&gt;
8. Decrypt cipher text using SK with M' = C^D mod N: &lt;br /&gt;
&lt;br /&gt;
Decrypted message M’ = C^D mod N = 13^7 mod 33 = 7 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital Signing==&lt;br /&gt;
&lt;br /&gt;
Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.  Thus, Digital Signing is accomplished in the following way.&lt;br /&gt;
&lt;br /&gt;
Person B wishes to send an encrypted message to Person A&lt;br /&gt;
&lt;br /&gt;
1.  The two parties exchange public keys.&lt;br /&gt;
&lt;br /&gt;
2.  Person B Encrypts the message with their own Private Key.&lt;br /&gt;
&lt;br /&gt;
3.  Person B then Encrypts the message again with Person A's Public Key, and sends the message to Person A.&lt;br /&gt;
&lt;br /&gt;
4.  Person A recieves the message, and decrypts it once with their own private key, and then again with Person &lt;br /&gt;
B's Public Key.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the message was encrypted with Person A's public key, only Person A can decrypt the message with their private key.  Since the message was also decrypted with Person B's public key, Person A also knows that the message must have been encrypted with Person B's Public key verifying the source of the message.&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
The algorithm was first publicized in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.  The three worked at MIT at the time.  RSA stands for Rivest, Shamir, and Adleman.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*  Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, ''Introduction to Algorithms'', 2nd Edition,  MIT Press and McGraw-Hill, 2001, isbn  0-262-03293-7, pp.881–887&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*http://en.wikipedia.org/wiki/RSA&lt;br /&gt;
*http://en.wikipedia.org/wiki/Public-key_cryptography&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*http://imps.mcmaster.ca/courses/SE-4C03-09/project/wiki-pages.html&lt;br /&gt;
--[[User:Holtzmt|Holtzmt]] 13:16, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T17:16:14Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.  Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 0''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
The two keys are a tuple.  The public key consists of the Public Key Exponent, and the Modulous, (e,k).  The Private Key consists of the Private Key Exponent, and again, the Modulous, (d,k).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
Person A wants to send a message to Person B.  Person B requests person A's Public key, (e,k)&lt;br /&gt;
&lt;br /&gt;
The message to be sent is then turned into a number, ''m'', an integer between ''0'' and ''k''.  The encrypted ''c'' message can then be calculated by ''c = (m^e)(mod k)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Decryption===&lt;br /&gt;
&lt;br /&gt;
Person B wants to decrypt a message send from Person A.  Person B uses their own private key (d,k) to decrypt the message in the following way.  m = (c^d)(mod k)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital Signing==&lt;br /&gt;
&lt;br /&gt;
Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.  Thus, Digital Signing is accomplished in the following way.&lt;br /&gt;
&lt;br /&gt;
Person B wishes to send an encrypted message to Person A&lt;br /&gt;
&lt;br /&gt;
1.  The two parties exchange public keys.&lt;br /&gt;
&lt;br /&gt;
2.  Person B Encrypts the message with their own Private Key.&lt;br /&gt;
&lt;br /&gt;
3.  Person B then Encrypts the message again with Person A's Public Key, and sends the message to Person A.&lt;br /&gt;
&lt;br /&gt;
4.  Person A recieves the message, and decrypts it once with their own private key, and then again with Person &lt;br /&gt;
B's Public Key.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the message was encrypted with Person A's public key, only Person A can decrypt the message with their private key.  Since the message was also decrypted with Person B's public key, Person A also knows that the message must have been encrypted with Person B's Public key verifying the source of the message.&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
The algorithm was first publicized in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.  The three worked at MIT at the time.  RSA stands for Rivest, Shamir, and Adleman.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*  Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, ''Introduction to Algorithms'', 2nd Edition,  MIT Press and McGraw-Hill, 2001, isbn  0-262-03293-7, pp.881–887&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*http://en.wikipedia.org/wiki/RSA&lt;br /&gt;
*http://en.wikipedia.org/wiki/Public-key_cryptography&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*http://imps.mcmaster.ca/courses/SE-4C03-09/project/wiki-pages.html&lt;br /&gt;
--[[User:Holtzmt|Holtzmt]] 13:16, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T17:15:40Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.  Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 0''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
The two keys are a tuple.  The public key consists of the Public Key Exponent, and the Modulous, (e,k).  The Private Key consists of the Private Key Exponent, and again, the Modulous, (d,k).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
Person A wants to send a message to Person B.  Person B requests person A's Public key, (e,k)&lt;br /&gt;
&lt;br /&gt;
The message to be sent is then turned into a number, ''m'', an integer between ''0'' and ''k''.  The encrypted ''c'' message can then be calculated by ''c = (m^e)(mod k)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Decryption===&lt;br /&gt;
&lt;br /&gt;
Person B wants to decrypt a message send from Person A.  Person B uses their own private key (d,k) to decrypt the message in the following way.  m = (c^d)(mod k)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital Signing==&lt;br /&gt;
&lt;br /&gt;
Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.  Thus, Digital Signing is accomplished in the following way.&lt;br /&gt;
&lt;br /&gt;
Person B wishes to send an encrypted message to Person A&lt;br /&gt;
&lt;br /&gt;
1.  The two parties exchange public keys.&lt;br /&gt;
&lt;br /&gt;
2.  Person B Encrypts the message with their own Private Key.&lt;br /&gt;
&lt;br /&gt;
3.  Person B then Encrypts the message again with Person A's Public Key, and sends the message to Person A.&lt;br /&gt;
&lt;br /&gt;
4.  Person A recieves the message, and decrypts it once with their own private key, and then again with Person &lt;br /&gt;
B's Public Key.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the message was encrypted with Person A's public key, only Person A can decrypt the message with their private key.  Since the message was also decrypted with Person B's public key, Person A also knows that the message must have been encrypted with Person B's Public key verifying the source of the message.&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
The algorithm was first publicized in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.  The three worked at MIT at the time.  RSA stands for Rivest, Shamir, and Adleman.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*  Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, ''Introduction to Algorithms'', 2nd Edition,  MIT Press and McGraw-Hill, 2001, isbn  0-262-03293-7, pp.881–887&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*http://en.wikipedia.org/wiki/RSA&lt;br /&gt;
*http://en.wikipedia.org/wiki/Public-key_cryptography&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
*http://imps.mcmaster.ca/courses/SE-4C03-09/project/wiki-pages.html&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T17:13:09Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.  Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 0''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
The two keys are a tuple.  The public key consists of the Public Key Exponent, and the Modulous, (e,k).  The Private Key consists of the Private Key Exponent, and again, the Modulous, (d,k).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
Person A wants to send a message to Person B.  Person B requests person A's Public key, (e,k)&lt;br /&gt;
&lt;br /&gt;
The message to be sent is then turned into a number, ''m'', an integer between ''0'' and ''k''.  The encrypted ''c'' message can then be calculated by ''c = (m^e)(mod k)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Decryption===&lt;br /&gt;
&lt;br /&gt;
Person B wants to decrypt a message send from Person A.  Person B uses their own private key (d,k) to decrypt the message in the following way.  m = (c^d)(mod k)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital Signing==&lt;br /&gt;
&lt;br /&gt;
Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.  Thus, Digital Signing is accomplished in the following way.&lt;br /&gt;
&lt;br /&gt;
Person B wishes to send an encrypted message to Person A&lt;br /&gt;
&lt;br /&gt;
1.  The two parties exchange public keys.&lt;br /&gt;
&lt;br /&gt;
2.  Person B Encrypts the message with their own Private Key.&lt;br /&gt;
&lt;br /&gt;
3.  Person B then Encrypts the message again with Person A's Public Key, and sends the message to Person A.&lt;br /&gt;
&lt;br /&gt;
4.  Person A recieves the message, and decrypts it once with their own private key, and then again with Person &lt;br /&gt;
B's Public Key.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the message was encrypted with Person A's public key, only Person A can decrypt the message with their private key.  Since the message was also decrypted with Person B's public key, Person A also knows that the message must have been encrypted with Person B's Public key verifying the source of the message.&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
The algorithm was first publicized in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.  The three worked at MIT at the time.  RSA stands for Rivest, Shamir, and Adleman.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*  Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, ''Introduction to Algorithms'', 2nd Edition,  MIT Press and McGraw-Hill, 2001, isbn  0-262-03293-7, pp.881–887&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
*http://en.wikipedia.org/wiki/RSA&lt;br /&gt;
*http://en.wikipedia.org/wiki/Public-key_cryptography&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T17:12:13Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;/* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.  Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 0''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
The two keys are a tuple.  The public key consists of the Public Key Exponent, and the Modulous, (e,k).  The Private Key consists of the Private Key Exponent, and again, the Modulous, (d,k).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
Person A wants to send a message to Person B.  Person B requests person A's Public key, (e,k)&lt;br /&gt;
&lt;br /&gt;
The message to be sent is then turned into a number, ''m'', an integer between ''0'' and ''k''.  The encrypted ''c'' message can then be calculated by ''c = (m^e)(mod k)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Decryption===&lt;br /&gt;
&lt;br /&gt;
Person B wants to decrypt a message send from Person A.  Person B uses their own private key (d,k) to decrypt the message in the following way.  m = (c^d)(mod k)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital Signing==&lt;br /&gt;
&lt;br /&gt;
Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.  Thus, Digital Signing is accomplished in the following way.&lt;br /&gt;
&lt;br /&gt;
Person B wishes to send an encrypted message to Person A&lt;br /&gt;
&lt;br /&gt;
1.  The two parties exchange public keys.&lt;br /&gt;
&lt;br /&gt;
2.  Person B Encrypts the message with their own Private Key.&lt;br /&gt;
&lt;br /&gt;
3.  Person B then Encrypts the message again with Person A's Public Key, and sends the message to Person A.&lt;br /&gt;
&lt;br /&gt;
4.  Person A recieves the message, and decrypts it once with their own private key, and then again with Person &lt;br /&gt;
B's Public Key.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the message was encrypted with Person A's public key, only Person A can decrypt the message with their private key.  Since the message was also decrypted with Person B's public key, Person A also knows that the message must have been encrypted with Person B's Public key verifying the source of the message.&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
The algorithm was first publicized in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.  The three worked at MIT at the time.  RSA stands for Rivest, Shamir, and Adleman.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*  Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, ''Introduction to Algorithms'', 2nd Edition,  MIT Press and McGraw-Hill, 2001, isbn  0-262-03293-7, pp.881–887&lt;br /&gt;
*http://en.wikipedia.org/wiki/RSA&lt;br /&gt;
*http://en.wikipedia.org/wiki/Public-key_cryptography&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T17:07:18Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;/* History */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.  Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 0''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
The two keys are a tuple.  The public key consists of the Public Key Exponent, and the Modulous, (e,k).  The Private Key consists of the Private Key Exponent, and again, the Modulous, (d,k).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
Person A wants to send a message to Person B.  Person B requests person A's Public key, (e,k)&lt;br /&gt;
&lt;br /&gt;
The message to be sent is then turned into a number, ''m'', an integer between ''0'' and ''k''.  The encrypted ''c'' message can then be calculated by ''c = (m^e)(mod k)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Decryption===&lt;br /&gt;
&lt;br /&gt;
Person B wants to decrypt a message send from Person A.  Person B uses their own private key (d,k) to decrypt the message in the following way.  m = (c^d)(mod k)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital Signing==&lt;br /&gt;
&lt;br /&gt;
Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.  Thus, Digital Signing is accomplished in the following way.&lt;br /&gt;
&lt;br /&gt;
Person B wishes to send an encrypted message to Person A&lt;br /&gt;
&lt;br /&gt;
1.  The two parties exchange public keys.&lt;br /&gt;
&lt;br /&gt;
2.  Person B Encrypts the message with their own Private Key.&lt;br /&gt;
&lt;br /&gt;
3.  Person B then Encrypts the message again with Person A's Public Key, and sends the message to Person A.&lt;br /&gt;
&lt;br /&gt;
4.  Person A recieves the message, and decrypts it once with their own private key, and then again with Person &lt;br /&gt;
B's Public Key.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the message was encrypted with Person A's public key, only Person A can decrypt the message with their private key.  Since the message was also decrypted with Person B's public key, Person A also knows that the message must have been encrypted with Person B's Public key verifying the source of the message.&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
The algorithm was first publicized in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.  The three worked at MIT at the time.  RSA stands for Rivest, Shamir, and Adleman.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*  Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, ''Introduction to Algorithms'', 2nd Edition,  MIT Press and McGraw-Hill, 2001, isbn  0-262-03293-7, pages = pp.881–887&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T16:59:46Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.  Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 0''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
The two keys are a tuple.  The public key consists of the Public Key Exponent, and the Modulous, (e,k).  The Private Key consists of the Private Key Exponent, and again, the Modulous, (d,k).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
Person A wants to send a message to Person B.  Person B requests person A's Public key, (e,k)&lt;br /&gt;
&lt;br /&gt;
The message to be sent is then turned into a number, ''m'', an integer between ''0'' and ''k''.  The encrypted ''c'' message can then be calculated by ''c = (m^e)(mod k)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Decryption===&lt;br /&gt;
&lt;br /&gt;
Person B wants to decrypt a message send from Person A.  Person B uses their own private key (d,k) to decrypt the message in the following way.  m = (c^d)(mod k)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital Signing==&lt;br /&gt;
&lt;br /&gt;
Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.  Thus, Digital Signing is accomplished in the following way.&lt;br /&gt;
&lt;br /&gt;
Person B wishes to send an encrypted message to Person A&lt;br /&gt;
&lt;br /&gt;
1.  The two parties exchange public keys.&lt;br /&gt;
&lt;br /&gt;
2.  Person B Encrypts the message with their own Private Key.&lt;br /&gt;
&lt;br /&gt;
3.  Person B then Encrypts the message again with Person A's Public Key, and sends the message to Person A.&lt;br /&gt;
&lt;br /&gt;
4.  Person A recieves the message, and decrypts it once with their own private key, and then again with Person &lt;br /&gt;
B's Public Key.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the message was encrypted with Person A's public key, only Person A can decrypt the message with their private key.  Since the message was also decrypted with Person B's public key, Person A also knows that the message must have been encrypted with Person B's Public key verifying the source of the message.&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*  Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, ''Introduction to Algorithms'', 2nd Edition,  MIT Press and McGraw-Hill, 2001, isbn  0-262-03293-7, pages = pp.881–887&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T16:45:58Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.  Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 0''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
The two keys are a tuple.  The public key consists of the Public Key Exponent, and the Modulous, (e,k).  The Private Key consists of the Private Key Exponent, and again, the Modulous, (d,k).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
Person A wants to send a message to Person B.  Person B requests person A's Public key, (e,k)&lt;br /&gt;
&lt;br /&gt;
The message to be sent is then turned into a number, ''m'', an integer between ''0'' and ''k''.  The encrypted ''c'' message can then be calculated by ''c = (m^e)(mod k)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Decryption===&lt;br /&gt;
&lt;br /&gt;
Person B wants to decrypt a message send from Person A.  Person B uses their own private key (d,k) to decrypt the message in the following way.  m = (c^d)(mod k)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital Signing==&lt;br /&gt;
&lt;br /&gt;
Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.  Thus, Digital Signing is accomplished in the following way.&lt;br /&gt;
&lt;br /&gt;
Person B wishes to send an encrypted message to Person A&lt;br /&gt;
&lt;br /&gt;
1.  The two parties exchange public keys.&lt;br /&gt;
&lt;br /&gt;
2.  Person B Encrypts the message with their own Private Key.&lt;br /&gt;
&lt;br /&gt;
3.  Person B then Encrypts the message again with Person A's Public Key, and sends the message to Person A.&lt;br /&gt;
&lt;br /&gt;
4.  Person A recieves the message, and decrypts it once with their own private key, and then again with Person &lt;br /&gt;
B's Public Key.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the message was encrypted with Person A's public key, only Person A can decrypt the message with their private key.  Since the message was also decrypted with Person B's public key, Person A also knows that the message must have been encrypted with Person B's Public key verifying the source of the message.&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T16:11:13Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.  Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 0''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
&lt;br /&gt;
Encryption is accomplished by first turning the message, ''m'' into an integer between ''0'' and ''k''.  The encrypted ''c'' message can then be calculated by ''c = (m^e)(mod k)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Decryption===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital Signing==&lt;br /&gt;
&lt;br /&gt;
Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.  Thus, Digital Signing is accomplished in the following way.&lt;br /&gt;
&lt;br /&gt;
Person B wishes to send an encrypted message to Person A&lt;br /&gt;
&lt;br /&gt;
1.  The two parties exchange public keys.&lt;br /&gt;
&lt;br /&gt;
2.  Person B Encrypts the message with their own Private Key.&lt;br /&gt;
&lt;br /&gt;
3.  Person B then Encrypts the message again with Person A's Public Key, and sends the message to Person A.&lt;br /&gt;
&lt;br /&gt;
4.  Person A recieves the message, and decrypts it once with their own private key, and then again with Person &lt;br /&gt;
B's Public Key.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the message was encrypted with Person A's public key, only Person A can decrypt the message with their private key.  Since the message was also decrypted with Person B's public key, Person A also knows that the message must have been encrypted with Person B's Public key verifying the source of the message.&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T16:04:31Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.  Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 0''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Digital Signing==&lt;br /&gt;
&lt;br /&gt;
Messages encrypted with with your Public Key can only be decrypted with your own private key.  Conversly, messages encrypted with your own Private Key, can only be decrypted with your public key.  Thus, Digital Signing is accomplished in the following way.&lt;br /&gt;
&lt;br /&gt;
Person B wishes to send an encrypted message to Person A&lt;br /&gt;
&lt;br /&gt;
1.  The two parties exchange public keys.&lt;br /&gt;
&lt;br /&gt;
2.  Person B Encrypts the message with their own Private Key.&lt;br /&gt;
&lt;br /&gt;
3.  Person B then Encrypts the message again with Person A's Public Key, and sends the message to Person A.&lt;br /&gt;
&lt;br /&gt;
4.  Person A recieves the message, and decrypts it once with their own private key, and then again with Person &lt;br /&gt;
B's Public Key.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Since the message was encrypted with Person A's public key, only Person A can decrypt the message with their private key.  Since the message was also decrypted with Person B's public key, Person A also knows that the message must have been encrypted with Person B's Public key verifying the source of the message.&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T15:53:07Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;/* Algorithm */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 0''.  ''d'' is the Private Key Exponent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Encryption===&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-12T15:48:15Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;/* Key Generation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer ''e'' such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  ''e'' is the Public Key Exponent.&lt;br /&gt;
&lt;br /&gt;
5. Compute ''d'' such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 0''.  ''d'' is the Private Key Exponent.&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-10T19:24:04Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;/* Key Generation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of ''k''. ''T(k) = (i-1)(j-1)''&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer e such that ''1 &amp;lt; e &amp;lt; T(k)'', and ''e'' and ''T(k)'' are [http://en.wikipedia.org/wiki/Coprime coprime].  e is the public key.&lt;br /&gt;
&lt;br /&gt;
5. Compute d such that ''ed = 1 mod(T(k))''.  In other words ''ed mod (T(k)) = 0''&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-10T19:01:56Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;/* Key Generation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
3.  Compute the Totient of k. T(k) = (i-1)(j-1)&lt;br /&gt;
&lt;br /&gt;
4.  Choose an integer e such that 1 &amp;lt; e &amp;lt; T(k), and e and T(k) are [http://en.wikipedia.org/wiki/Coprime coprime].&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-10T18:30:17Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Algorithm==&lt;br /&gt;
The RSA Algorithm consists of three phases, Key Generation, Encryption, and Decryption.&lt;br /&gt;
===Key Generation===&lt;br /&gt;
RSA utilizes two keys, a Public Key, and a Private key.  These keys are created in the following way.&lt;br /&gt;
&lt;br /&gt;
1.  Two suitably large different prime numbers are randomly generated, ''i'', ''j''.&lt;br /&gt;
&lt;br /&gt;
2.  The product of these two numbers is calculated and used as the modulus for both the public, and private keys.&lt;br /&gt;
''k = ij''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;math&amp;gt;\varphi(k) = (i-1)(j-1)\&amp;lt;/math&amp;gt;&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm</id>
		<title>RSA Encryption Algorithm</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/RSA_Encryption_Algorithm"/>
				<updated>2009-04-10T17:38:54Z</updated>
		
		<summary type="html">&lt;p&gt;Holtzmt:&amp;#32;New page: The RSA Encryption Algorithm is a form of encryption used in Public Key Encryption Algorithms.  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It ...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The RSA Encryption Algorithm is a form of encryption used in [[Public Key Encryption Algorithms]].  The algorithm consists of three phases, Key Generation, Encryption, and Decryption.  It is the first publicly disclosed algorithm suitable for digital signing.&lt;/div&gt;</summary>
		<author><name>Holtzmt</name></author>	</entry>

	</feed>