dc.contributor.advisor | Acken, John Michael | |
dc.contributor.author | Sadr, Behnaz | |
dc.date.accessioned | 2014-04-17T20:09:11Z | |
dc.date.available | 2014-04-17T20:09:11Z | |
dc.date.issued | 2011-07-01 | |
dc.identifier.uri | https://hdl.handle.net/11244/10269 | |
dc.description.abstract | The RSA Algorithm is the most widely used public key encryption method that has survived the past 34 years of scrutiny and criticism. Studying and understanding RSA is important for a student of cryptography or information security. Finding a good example that is small enough for easy standard calculation and large enough to be non-trivial was the main and initial goal of this study. In the course of studying the RSA algorithm, there were cases where the ciphertext would equal the plaintext. In other words, at these values, the encryption would not change the value of the original message as if the plaintext is falling through a hole and not get encrypted. These cases were called holes. Characterization of the holes become the second objective of this study. | |
dc.format | application/pdf | |
dc.language | en_US | |
dc.publisher | Oklahoma State University | |
dc.rights | Copyright is held by the author who has granted the Oklahoma State University Library the non-exclusive right to share this material in its institutional repository. Contact Digital Library Services at lib-dls@okstate.edu or 405-744-9161 for the permission policy on the use, reproduction or distribution of this material. | |
dc.title | Finding Cases of Ciphertext equal to Plaintext in the RSA Algorithm | |
dc.type | text | |
dc.contributor.committeeMember | Sohoni, Sohum | |
dc.contributor.committeeMember | Latino, Carl | |
osu.filename | Sadr_okstate_0664M_11533.pdf | |
osu.college | Engineering, Architecture, and Technology | |
osu.accesstype | Open Access | |
dc.description.department | School of Electrical & Computer Engineering | |
dc.type.genre | Thesis | |
dc.subject.keywords | asymmetric encryption | |
dc.subject.keywords | cryptography | |
dc.subject.keywords | holes | |
dc.subject.keywords | information security | |
dc.subject.keywords | public-key encryption | |
dc.subject.keywords | small rsa example | |