This paper presents the principles of public-key cryptography systems (asymmetric cryptography systems). In particular algorithm for finding RSA cryptosystem’s public and private keys will be analyzed to develop a new, more convenient algorithm for constructing a list of public and private keys that will work faster than the standard.
Криптосистема, симметричная криптосистема, шифрование, расшифрование, cryptosystem, symmetric cryptosystem, encryption, decryption
1. Yu.V. Romanec, P.A. Timofeev, V.F. Shan'gin, Zaschita informacii v komp'yuternyh sistemah i setyah. M., Radio i svyaz', 2001. 376 s.
2. R. Cherchhauz, Kody i shifry. Yuliy Cezar', «Enigma» i Internet. M., Ves' mir, 2009. 320 s.
3. Nil Koblic, Kurs teorii chisel i kriptografii. M., Nauchnoe izd-vo TVP, 2001. 254 s.
4. Yu.S.Harin, V.I. Bernik, G.V.Matveev, S.V. Agievich, Matematicheskie i komp'yuternye osnovy kriptologii. Minsk, Novoe znanie, 2003. 382 s.
5. A.P.Alferov, A.Yu. Zubov, A.S. Zhidkov, A.V. Cheremushkin, Osnovy kriptografii. M., Gelios ANV, 2005. 480 s.