NUMBER THEORY IN RSA ENCRYPTION SYSTEMS

  • Michael N. John Department of Mathematics, Akwa Ibom State University, Nigeria
  • Ogoegbulem Ozioma Department of Mathematics, Dennis Osadebay University, Anwai, asaba, Delta State, Nigeria
  • Obukohwo, Victor Department of Mathematics, Dennis Osadebay University, Anwai, asaba, Delta State, Nigeria
  • Henry Etaroghene Egbogho Department of Mathematics, Dennis Osadebay University, Anwai, asaba, Delta State, Nigeria
Keywords: RSA, Number Theory, Prime Numbers, Public Key Cryptography, Modular Arithmetic, Encryption, Decryption, Private Key, Security

Abstract

RSA encryption is a widely employed cryptographic system based on the principles of number theory. Number theory is the branch of pure mathematics that studies positive whole numbers, called natural numbers and integers. Number theory seeks to discover relationships existing between numbers. Cryptography is the study of encryption and decryption of information. By encrypting information, data can be transmitted to the intended recipient securely across the internet. In this paper, we propose an RSA encryption scheme based on number theory, showing its applications to cryptography.

Downloads

Download data is not yet available.

References

[1] K. Ireland and M. Rosen,A classical introduction to modern number theory, Second Edition, Springer-Verlag, New York,(1990).
[2] H. Stark,An introduction to number theory, Cambridge, The MIT Press, (1978).
[3] J. Silverman,A friendly introduction to number theory, Fourth Edition, Pearson, New York, (2011).
[4] S. Padhye, R. Sahu and V. Saraswat,Introduction to cryptography, Boca Raton, CRC Press, (2018).
[5] S. Rubinstein-Salzedo,Cryptography, Springer Nature, Switzerland, (2010).
[6] M. Omar,Number Theory Toward RSA Cryptography: in 10 Undergraduate Lectures (Discrete Mathematics), Volume 1,CreateSpace Independent Publishing, Scotts Valley, (2017).27
[7] Joseph H. Silverman,A Friendly Introduction to Number Theory, Am. Math. Compet., 10(2006), 12.
[8] Douglas Robert Stinson and Maura Paterson,Cryptography: theory and practice, CRC Press, (2018).
[9] Udoaka O. G. & Frank E. A. (2022). Finite Semi-group Modulo and Its Application to Symmetric Cryptography, International Journal of Pure Mathematics DOI: 10.46300/91019.2022.9.13.
[10] Udoaka, O. G. (2022). Generators and inner automorphism. THE COLLOQUIUM -A Multi-disciplinary Thematc Policy Journal www.ccsonlinejournals.com. Volume 10, Number 1 , Pages 102 -111 CC-BY-NC-SA 4.0 International Print ISSN : 2971-6624 eISSN: 2971-6632.
[11] Michael N. John & Udoaka O. G (2023). Algorithm and Cube-Lattice-Based Cryptography. International journal of Research Publication and reviews, Vol 4, no 10, pp 3312-3315 October 2023.
[12] Michael N. John, Udoaka O. G., "Computational GroupTheory and Quantum-Era Cryptography",International Journal of Scientific Research in Science,Engineering and Technology (IJSRSET), Online ISSN :2394-4099, Print ISSN : 2395-1990, Volume 10 Issue 6,pp. 01-10, November-December 2023. Available at doi :https://doi.org/10.32628/IJSRSET2310556
Published
2023-11-26
How to Cite
N. John, M., Ozioma, O., Victor, O., & Etaroghene Egbogho, H. (2023). NUMBER THEORY IN RSA ENCRYPTION SYSTEMS. GPH - International Journal of Mathematics, 6(11), 07-16. https://doi.org/10.5281/zenodo.10209900

Most read articles by the same author(s)