What is RSA Algorithm and How It Works ?

What is RSA Algorithm ?

The RSA algorithm is an asymmetric cryptology algorithm. It uses two different keys because it works asymmetrically. These keys are called Public Key and Private Key. As the name suggests, the public key is known to everyone, while the private key is known only to the person broadcasting the message.

This cryptology algorithm was developed by Ron Rivest, Adi Shamir, and Leonard Adleman in 1977 and used the initials of the surnames as the algorithm name (1).

 What is RSA Algorithm


Symmetric encryption requires sharing a secret key so that the receiving party can decrypt the data. However, since RSA is an asymmetric encryption technique, there is no need to share the secret key. Users’ private keys do not need to be stored. This frees the system from a large storage load.

It is an encryption technique that is extremely reliable because it is difficult to operate with large numbers.


The biggest disadvantage of the RSA algorithm is that it is an asymmetric encryption algorithm and is slow because it deals with large numbers.

The use of this algorithm, especially in wireless network systems, may cause some problems. Because it consumes a lot of bandwidth and slows down the system, causing performance degradation.


It is an asymmetric encryption algorithm. Instead of using a single key as in symmetric encryption; Two keys are used, one private (Private Key) and the other public (Public Key).

The degree of confidence is proportional to the size of the prime numbers used in encryption. It enables secure data sharing and authentication with digital signature, especially in systems with multiple users.

The numerical size of the key to be used is important for the system to have high speed as well as reliability. The required size to achieve a sufficient degree of reliability is determined using the Elliptic Curve Encryption (ECC) Algorithm.

The logic of RSA is based on the fact that factoring an integer is more difficult than multiplying it by new numbers. A base value is obtained by multiplying two sufficiently large and different prime numbers. And other key parameters are also derived from the same two prime numbers. Therefore, if the base value can be factored, the private key is compromised. Therefore, if we double or triple the key size, the encryption strength increases exponentially (2).

RSA Algorithm works like this;

Two prime numbers are chosen. The large number of these numbers is important for security. Let’s call these two numbers p and q. It is necessary to calculate the base value for the keys. If we say n to the base value; This value can be calculated as n = p*q. For the n value, the totient function is calculated.

Since both factors are prime, the totient function of n is found as; φ(n) = (p-1)(q-1). If we call our public key value e, a prime number must be chosen from the range 1< e < φ(n) to find e. Our value e is now our public key value. If we call our private key value d, d value is calculated as d*e = 1 mod (n).

What is an Encrypting file system?



Please enter your comment!
Please enter your name here


Most Popular

redmi note 10

Redmi Note 10 [mojito/sunny] nv data is corrupted fix

Nv data is corrupted fix When the IMEI number of the Redmi Note 10 phone is changed, there will be changes in the modem partition of the phone. When you install a new update to...
e025f test point

Galaxy F02s SM-E025F/DS test point

SM-E025F/DS test point edl mode is for phones with Qualcomm processors. The Samsung e025f has a Qualcomm Snapdragon 450 processor. We can put the SM-E025F in edl mode with the following test points. For this operation, you...

Redmi Note 8 (ginkgo) ENG Firmware All Board ID

Redmi Note 8 (ginkgo) This is a Redmi note 8 eng firmware supporting all board ids. 1.29 , 2.XX , 3.XXBoard id 1.29 tested. Didn't get a chance to try other board ids. Update 14.11.2021 for...
xperia flash tool

Xperia Flash Tool latest

Xperia Flash The Sony Xperia Flash Tool allows you to perform actions that the Sony Xperia Companion program does not allow, such as downloading and installing ROMs, unlocking bootloader, etc. As a user of Sony...
nck pro

NCK Pro Spreadtrum Module v2.0

NCK Pro Spreadtrum Nck Pro dongle Spreadtrum's new version is released. Many new features have been added to this version. Here are the new functions added. Nokia - EXCLUSIVE   Boot info, backup/restore NVRAM, read user code, write...