RSA Algorithm Technique in Asymmetry Encryption
Elena Milan Lopez / emilanlopez@bellarmine.edu / Faculty
Advisor: Gregory Kelsey
In the contemporary world, technology is being applied in all
day-to-day activities. The most influenced sector by technological evolution is
the communication sector. Currently, the transfer of information from one
person to another has been made efficient with the use of technology. Different
geographical areas of the world have been brought together with the increased
use of technology. Different platforms have been developed for the social
interaction of people. However, with the increased use of technology,
especially in communication, data privacy has been adversely affected, and this
is the main problem that is contributing to an immense debate on how to manage
it. As a result, it has been discovered that Asymmetry Encryption is effective
in curbing the problem. An individual can decide to use Asymmetric Encryption
for purposes of secure communication. However, different techniques can be
applied in the encryption, among which is the RSA algorithm. Therefore, the
main focus of the research is how this technique is helpful in Asymmetry
Encryption. The research methodology involved a literature review and the
engagement of the experts on data security. They explained the different
security measures and strategies applied to protect any type of information.
According to the research findings, the RSA algorithm uses two mathematically
linked keys in data security effectiveness. It creates and publishes a public
key on two large prime numbers alongside auxiliary values. The numbers are
secretly kept, whereby anybody can encrypt a message through the public key,
but only those who know the prime numbers can decode it.