How does RSA Encryption work?

Fundamentals, Current Breakability and Future-Proof Evaluation

Alex Perrakis
5 min readMar 12, 2024
Image by WallpaperAccess and Alex Perrakis

Introduction

RSA, or Rivest-Shamir-Adleman, named after its three creators, is the most famous asymmetric cryptographic algorithm. It was developed in 1977 and since then, it has become a cornerstone in the field of secure communica-tion and digital signatures.

What is asymmetric encryption?

Asymmetric encryption, also known as public-key encryption, is a cryptographic system that utilizes a pair of keys for secure communication. The key pair consists of a public key, which is openly shared and a private key, which is kept secret by its owner. These keys are mathematically related, but data encrypted with one key can only be decrypted by the other key. This system is widely used to facilitate secure communication over the internet, where the public key is used for encryption, and the private key is used for decryption.

Asymmetric Cryptographic System (Image by Freepik and Alex Perrakis)

Generally, an asymmetric cryptographic system operates as follows:

  • Alice (sender) encrypts the message using Bob’s (recipient) public key and a ciphered…

--

--

Alex Perrakis
Alex Perrakis

Written by Alex Perrakis

💻Software Engineer | Cybersecurity Master Student

Responses (3)