IUP Publications Online
Home About IUP Magazines Journals Books Archives
     
Recommend    |    Subscriber Services    |    Feedback    |     Subscribe Online
 
The IUP Journal of Computer Sciences :
Selecting Plaintext in Rabin Cryptosystems Using Padding Generated by Pseudo-Random Bit Generators
:
:
:
:
:
:
:
:
:
 
 
 
 
 
 
 

As with all asymmetric cryptosystems (Stalling, 2003), the Rabin system uses both a public and a private key. The public key is necessary for later encoding and can be published, while the private key must be known only to the sending and receiving entities A and B. Each entity creates a public key and a corresponding private key. For public-key encryption, receiver B generates two large random and distinct prime numbers p, q such that p = q = 3 (mod 4), each having roughly the same size. Then B computes n = pq. B’s public key is n, B’s private key is (p, q).

 
 
 

As with all asymmetric cryptosystems (Stalling, 2003), the Rabin system uses both a public and a private key. The public key is necessary for later encoding and can be published, while the private key must be known only to the sending and receiving entities A and B. Each entity creates a public key and a corresponding private key. For public-key encryption, receiver B generates two large random and distinct prime numbers p, q such that p = q = 3 (mod 4), each having roughly the same size. Then B computes n = pq. B’s public key is n, B’s private key is (p, q).

 
 
 

Computer Sciences Journal, Business Intelligence, Enterprise Systems, Enterprise Resource Planning, Customer Relationship Management, CRM, Business Operations Management, Business Process Mining, Finite State Machine, Transactional Information System, Genetic Algorithms, Decision Making Process, Data Mining Tools, Online Analysis Processing, OLAP, Artificial Intelligence.