Public Key Cryptography Foundations

Complete Guide to RSA, Rabin, Goldwasser-Micali, and ElGamal Cryptosystems Part I: RSA Encryption – Plain and OAEP RSA Algorithm Overview RSA remains one of the most widely used public-key cryptosystems. Understanding both its basic form and secure implementations is crucial for modern cryptography. Key Generation Process Choose two large primes: p and q (typically 1024+ […]

Mathematical Foundations and Basic Concepts of Cryptography

Basic Cryptographic Definitions Core Security Goals Confidentiality: information is accessible only to authorized parties Integrity: information hasn’t been altered by unauthorized parties Authenticity: information originates from claimed source Non-repudiation: sender cannot deny sending the message Threat Models: Passive adversary: Only observes communications (eavesdropper) Active adversary: Can modify, insert, or delete messages Adaptive adversary: Can change […]