Research Article

Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications

Table 6

RSA key creation, encryption, and decryption.

SenderReceiver

Key creation
Choose two secret prime numbers p and q. Choose encryption exponent e with GCD (e, (p − 1) (q − 1)) = 1. Publish N = pq, and e.
Encryption
Choose plaintext m. Use Bobʼs public key (N, e) to compute c = me mod N. Send ciphertext c to Bob
Decryption
Compute d satisfying Ed = 1(mod (p − 1) (q − 1))
Complexity compute m′ = cd mod N Then m′ equals the plaintext m.