Web Backgrounds - to Ingest

Understanding ​RSA

Faizah Kolapo, Gurkaran Singh, Rupesh ​Kowtharapu, George Chukwuemeka

Walkthrough

It is no secret that with the digitalization of the world, online security and privacy are always at risk. This ​project focuses on the RSA cryptosystem which is widely used as a means of securing communications ​through encryption. RSA plays a crucial role in securing our data and is embedded in a lot of the ​applications we use today. Without knowledge of how the RSA algorithm works, it would be difficult to ​grasp how encryption keeps our data safe. RSA is an algorithm we interact with daily, and a good example ​of this is web browsing where encryption ensures we are accessing a website securely.


This concept is conveyed in the form of a video for better assimilation of key ideas, by narrating with ​engaging and informative visuals to make it less of a chore for you. By watching the video, you will be able ​to at least have a conversation about the fundamental concepts of RSA and how it works in securing our ​information. You will understand how the keys are generated as well as how they are used to encrypt and ​decrypt messages. You might be wondering how the authenticity of messages will be verified. You will also ​be introduced to the idea of digital signatures which are used as a means of verification to ensure the ​message originated from the correct source and was not modified in transit by an adversary.


However, every secure process comes with vulnerabilities. We will dive into some common attacks that ​exploit certain weaknesses in the way the algorithm is implemented. You will also be introduced to what ​some of these weaknesses are and how to bypass them as a means of strengthening the cryptosystem. ​Although RSA is known to be a secure algorithm, years of research have revealed potential attacks that ​could potentially cripple the system if proper prevention measures are not implemented. We will spend a ​good portion of our time in this video looking at different types of attacks one after the other, how they are ​carried out, as well as some recommendations and measures that need to be in place to prevent the ​attacks from occurring. However, please keep in mind that the list of attacks out there is exhaustive and ​cannot be covered in one video, so we urge you to engage with some of the resources listed in the ​description to broaden your knowledge on this topic, if interested.


At the end of this video, you will be able to explain how RSA encryption and decryption works and certain ​implementation measures to keep in mind for closing gaps that can be exploited by bad actors. We invite ​you to watch the teaching aide, thoroughly absorb the content, and come out knowing that you have an ​idea of how digital communications are secured. One key point to note is that understanding RSA should ​not just be a tool for security professionals, it should serve as a way to equip yourself and prepare for ​potential challenges you might face in the digital world.