Key Generation
As with all asymmetric cryptosystems, the Rabin system uses both a public and a private key. The public key is necessary for later encryption and can be published, while the private key must be possessed only by the recipient of the message.
The precise key-generation process follows:
- Choose two large distinct primes p and q. One may choose to simplify the computation of square roots modulo p and q (see below). But the scheme works with any primes.
- Let . Then n is the public key. The primes p and q are the private key.
To encrypt a message only the public key n is needed. To decrypt a ciphertext the factors p and q of n are necessary.
As a (non-real-world) example, if and, then . The public key, 77, would be released, and the message encoded using this key. And, in order to decode the message, the private keys, 7 and 11, would have to be known (of course, this would be a poor choice of keys, as the factorization of 77 is trivial; in reality much larger numbers would be used).
Read more about this topic: Rabin Cryptosystem
Famous quotes containing the words key and/or generation:
“It so happened that, a few weeks later, Old Ernie [Ernest Hemingway] himself was using my room in New York as a hide-out from literary columnists and reporters during one of his rare stopover visits between Africa and Key West. On such all-too-rare occasions he lends an air of virility to my dainty apartment which I miss sorely after he has gone and all the furniture has been repaired.”
—Robert Benchley (18891945)
“We were that generation called silent, but we were silent neither, as some thought, because we shared the periods official optimism nor, as others thought, because we feared its official repression. We were silent because the exhilaration of social action seemed to many of us just one more way of escaping the personal, of masking for a while that dread of the meaningless which was mans fate.”
—Joan Didion (b. 1935)