# A method for obtaining digital signatures and public-key cryptosystems

**Ronald L. Rivest****Adi Shamir****Lm Adleman**

CiteWeb id: 19780000003

CiteWeb score: 17323

DOI: 10.1145/359340.359342

An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intended recipient. Only he can decipher the message, since only he knows the corresponding decryption key. A message can be “signed” using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature. This has obvious applications in “electronic mail” and “electronic funds transfer” systems. A message is encrypted by representing it as a number M, raising M to a publicly specified power e, and then taking the remainder when the result is divided by the publicly specified product, n, of two large secret prime numbers p and q. Decryption is similar; only a different, secret, power d is used, where e * d = 1(mod (p - 1) * (q - 1)). The security of the system rests in part on the difficulty of factoring the published divisor, n.

Links:- www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA606588&Location=U2&doc=GetTRDoc.pdf
- dl.acm.org/ft_gateway.cfm?id=359342&type=pdf
- math.cornell.edu/~kbrown/3360/rsapaper.pdf
- cosc.iup.edu/sezekiel/Teaching2002-2005/Spring2009/cosc427/Rsapaper.pdf
- people.csail.mit.edu/rivest/Rsapaper.pdf
- signallake.com/innovation/RivestShamirAdleman-AMethodForObtainingDigitalSignaturesAndPublicKeyCryptosystems.pdf
- www.titoktan.hu/_raktar/Eredetidokumentumok/RSA-original-paper1976.pdf
- www.cs.umass.edu/~emery/classes/cmpsci691st/readings/Sec/Rsapaper.pdf
- www-math.mit.edu/~sassaf/courses/304/cibor3.pdf
- langevin.univ-tln.fr/cours/MLC/extra/Rsapaper.pdf
- moodle.utc.fr/pluginfile.php/47061/mod_resource/content/0/PresentationUV/RSApaper-facsimile.pdf
- courses.cs.vt.edu/cs5204/fall09-kafura/Papers/Security/RSA-Paper.pdf
- people.cs.umass.edu/~emery/classes/cmpsci691st/readings/Sec/Rsapaper.pdf
- web.williams.edu/Mathematics/lg5/302/RSA.pdf
- www.cis.upenn.edu/~nadiah/courses/cis800-02-f13/readings/rivest-shamir-adleman.pdf
- www.math.toronto.edu/lgoldmak/302/RSA.pdf
- igm.univ-mlv.fr/~jyt/Crypto/4/Rsapaper.pdf
- math.univ-lyon1.fr/homes-www/thuillier/enseignements/2007-08/ATN/RivestShamirAdleman.pdf
- www.cse.psu.edu/~pdm12/cse543-f11/papers/rsa.pdf
- csie.fju.edu.tw/%7Eyeh/research/papers/os-reading-list/rivest-cacm78-rsa.pdf

Ronald L. Rivest, Adi Shamir, Lm Adleman,

A method for obtaining digital signatures and public-key cryptosystems(1978)## HTML code:

## Wiki code: