Understanding RSA
Faizah Kolapo, Gurkaran Singh, Rupesh Kowtharapu, George Chukwuemeka
Walkthrough
It is no secret that with the digitalization of the world, online security and privacy are always at risk. This project focuses on the RSA cryptosystem which is widely used as a means of securing communications through encryption. RSA plays a crucial role in securing our data and is embedded in a lot of the applications we use today. Without knowledge of how the RSA algorithm works, it would be difficult to grasp how encryption keeps our data safe. RSA is an algorithm we interact with daily, and a good example of this is web browsing where encryption ensures we are accessing a website securely.
This concept is conveyed in the form of a video for better assimilation of key ideas, by narrating with engaging and informative visuals to make it less of a chore for you. By watching the video, you will be able to at least have a conversation about the fundamental concepts of RSA and how it works in securing our information. You will understand how the keys are generated as well as how they are used to encrypt and decrypt messages. You might be wondering how the authenticity of messages will be verified. You will also be introduced to the idea of digital signatures which are used as a means of verification to ensure the message originated from the correct source and was not modified in transit by an adversary.
However, every secure process comes with vulnerabilities. We will dive into some common attacks that exploit certain weaknesses in the way the algorithm is implemented. You will also be introduced to what some of these weaknesses are and how to bypass them as a means of strengthening the cryptosystem. Although RSA is known to be a secure algorithm, years of research have revealed potential attacks that could potentially cripple the system if proper prevention measures are not implemented. We will spend a good portion of our time in this video looking at different types of attacks one after the other, how they are carried out, as well as some recommendations and measures that need to be in place to prevent the attacks from occurring. However, please keep in mind that the list of attacks out there is exhaustive and cannot be covered in one video, so we urge you to engage with some of the resources listed in the description to broaden your knowledge on this topic, if interested.
At the end of this video, you will be able to explain how RSA encryption and decryption works and certain implementation measures to keep in mind for closing gaps that can be exploited by bad actors. We invite you to watch the teaching aide, thoroughly absorb the content, and come out knowing that you have an idea of how digital communications are secured. One key point to note is that understanding RSA should not just be a tool for security professionals, it should serve as a way to equip yourself and prepare for potential challenges you might face in the digital world.