Cryptography and computer security have always been side interests for me. Recently, while I was reading about RSA encryption, I thought about how well I understood the algorithm. For me, the true test of understanding of something is always whether I can code it from scratch. While this goes against the "don't reinvent the wheel" principle of software development—a principle which I hold very dear when it comes to professional work, reinventing the wheel can be a great way to explore and learn more.
What follows is a basic walk-through of RSA encryption, accompanied by a simple (but relatively efficient) Python implementation of it.
Some basic group theory and number theory knowledge is needed. I provide some of the basics of the required group theory in the appendix. Most of it is there for the mathematically minded, and can be skipped by anyone not too interested in the mathematical proofs.
Disclaimer: None of the code in this article are to be used in a real application. There are many many considerations that go into creation of production-ready cryptographic software that are not considered here. The purpose of the code in this article is to build a bare-minimum implementation of basic, deterministic, RSA encryption and decryption. This article is for educational purposes only.
An Overview of the RSA Cryptosystem
The RSA cryptosystem is an asymmetric cryptosystem that relies on the following intuitive observations, where by easy we mean asymptotically fast algorithms for the mentioned problem exist, and by difficult we mean no asymptotically fast algorithm is known:
- It is easy to find two distinct large primes and
- It is easy to multiply two large primes together, calculating
- However, given it is difficult to factor out and
- Given and , with and calculating is easy.
- But inversely, given and it is difficult to calculate
- However, if the multiplicative inverse of modulo labelled is given, then the previous calculation is easy. (The multiplicative inverse satisfies .)
- And finally, calculating from only and is difficult, but easy if the factorization of is known.
Putting all of this together, we get a scheme for an asymmetric cryptosystem as follows.
Key Generation: Generate distinct primes and and let Also let and pick any Calculate as the multiplicative inverse of modulo using the extended Euclidean algorithm. The private key is then and the public key is
Encryption: To encrypt plaintext, first encode the plaintext (by padding it for example) so that it consists of blocks of size less than Then for block define as the encryption function.
Decryption: To decrypt ciphertext given by define We then have For this to work, we need The following theorem then shows that the encryption and decryption algorithms satisfy
To prove correctness the main key is to show that
- Theorem
Let and be given as above. Then for any Proof First, assume that This means that is in that is, the multiplicative group of nonzero integers modulo Since we have as for any group and any element we have and in this case. (For a proof of this, see the appendix on group theory basics.) Since there exists some such that This gives
The case where means either divides or does, but not both since then which can not be since we picked Let's assume does, and let with Then Also, because does not divide either or So we have that and have the same remainder modulo both and By the Chinese remainder theorem, we get the two are then equivalent modulo The case for dividing is symmetric.
The Fun Part: Implementation and Practicalities
Let's put the pieces the puzzle together now and implement a simple RSA cryptosystem in Python. As we will see, each piece of the implementation here ends up being related to interesting and well-studied areas of mathematics and computer science.
Key Generation and Primality Tests
To start, our key generation requires us to generate two primes and We note above that if is small enough then an attacker can simply factor to get the two primes, use them to calculate and from there calculate Hence we need and therefore and to be large.
To generate a large prime we start by deciding the number of bits we require in the prime. This number is one of the key parameters that determines the strength of our cryptosystem. Let's call this number and let's assume for simplicity that for all our intended purposes. In practice, is usually between and As I typed this, I decided to check Facebook and GMail to see what key strength they use in their secure TLS connections. Let's look at Facebook first:
OpenSSL> s_client -connect facebook.com:443
CONNECTED(00000003)
[...]
New, TLSv1/SSLv3, Cipher is AES128-GCM-SHA256
Server public key is 2048 bit
So bit keys are used here. This means each prime is bits long. And GMail:
OpenSSL> s_client -connect mail.google.com:443
CONNECTED(00000003)
[...]
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES128-GCM-SHA256
Server public key is 1024 bit
So GMail is using bit keys, meaning each prime is bits long.
To generate a prime we start by generating bits of random data, and then manually making sure both the leading and trailing bits are ones to ensure the number is of size greater than (we don't want to generate, say, by chance, no matter how small the probability) and that it is an odd number. (Side note on entropy of the primes generated: forcing these bits to be here reduces the true entropy of the primes, more on this in a bit.) Let denote the number given by the manipulated random bits as described above. Then we proceed to check for primality starting from and onwards. As soon as a prime is reached, we let be equal to it. It is generally a good idea to give up on an interval after a certain number of attempts. To do this effectively, we need to consider the Prime Number Theorem which, letting denote the number of primes less than or equal to tells us:
In other words, there are roughly primes smaller than or equal to and the larger gets, the better this estimate becomes. This translates directly to the heuristic that around for or so, a prime appears in about every consecutive numbers. However, this is only a heuristic, and large gaps in prime numbers exist. To avoid being trapped in one of these large gaps, we decide to give up on after say, numbers consecutive to it have been tested and failed. In such a case, we simply generate new random bits and repeat the process all over. The end result ends up looking like this:
def generate_random_prime(bits, primality_test):
"""Generate random prime number with n bits."""
get_random_t = lambda: random.getrandbits(bits) | 1 << bits | 1
p = get_random_t()
for i in itertools.count(1):
if primality_test(p):
return p
else:
if i % (bits * 2) == 0:
p = get_random_t()
else:
p += 2 # Add 2 since we are only interested in odd numbers
This function gets in an infinite loop if there are no prime numbers. This can only happen with small so we ignore this possible source of bug at this point in favour of an efficient implementation.
Next, we notice in the above that the primality test is the very core of the algorithm. Let's first start by trying a very simple primality test and seeing its performance. To measure the performance, the logged decorator from the Python decorators post is used. First the primality test:
@logged("%b %d %Y - %H:%M:%S")
def simple_is_prime(n):
"""Returns True if n is a prime. False otherwise."""
if n % 2 == 0:
return n == 2
if n % 3 == 0:
return n == 3
k = 6L
while (k - 1) ** 2 <= n:
if n % (k - 1) == 0 or n % (k + 1) == 0:
return False
k += 6
return True
This is the somewhat more evolved version of the algorithm that checks against divisibility by all numbers smaller than or equal to Our version first tests and and afterwards against numbers of the form since these are the only numbers not divisible by and Let's look at the efficiency:
>>> for b in [8, 16, 32, 44, 45, 46]:
... print "Generating %d-bit prime: " % b
... print generate_random_prime(b, simple_is_prime)
...
Generating 8-bit prime:
- Running 'generate_random_prime' on Aug 21 2013 - 13:53:42
- Finished 'generate_random_prime', execution time = 0.000s
337
Generating 16-bit prime:
- Running 'generate_random_prime' on Aug 21 2013 - 13:53:42
- Finished 'generate_random_prime', execution time = 0.000s
129737
Generating 32-bit prime:
- Running 'generate_random_prime' on Aug 21 2013 - 13:53:42
- Finished 'generate_random_prime', execution time = 0.027s
6088203911
Generating 44-bit prime:
- Running 'generate_random_prime' on Aug 21 2013 - 13:53:42
- Finished 'generate_random_prime', execution time = 0.876s
34009683800003
Generating 45-bit prime:
- Running 'generate_random_prime' on Aug 21 2013 - 13:53:43
- Finished 'generate_random_prime', execution time = 1.139s
44586027757781
Generating 46-bit prime:
- Running 'generate_random_prime' on Aug 21 2013 - 13:53:44
- Finished 'generate_random_prime', execution time = 2.215s
87012671597869
On my computer, around is when the time required to generate a prime becomes noticeable. Of course, one run is not a very accurate measurement at all because of the randomness in the generation algorithm. However, we can easily see that while the algorithm above is of order in it is of order in In other words, it is exponential in
Fortunately, the problem of determining whether a number is prime or not is in This means there is a deterministic polynomial time (polynomial in and not as shown above) algorithm for it. The first deterministic algorithm to accomplish this is called AKS which is named after the authors of the seminal paper "PRIMES is in P" by Agrawal, Kayal, and Saxena. You can read the original paper here.
However, a practical implementation of this algorithm ends up being quite inefficient, though still better than our simple algorithm above for large numbers. One of the better algorithms is Rabin-Miller which is also polynomial time in but unlike AKS, Rabin-Miller is not deterministic. This means that the algorithm makes use of random numbers, and there is a chance it might not return the correct result at the end. With the proper choice of parameters, Rabin-Miller can reduce the probability of a false positive to astronomically small though, while still being quite efficient.
The basic idea of Rabin-Miller algorithm is to notice that if is prime then for any we have as we already saw. Let where is odd. Now consider the finite sequence of numbers
Notice that the last number in the sequence . The sequence was defined based on the idea that each number is the previous number, squared, modulo . That is, Because of this, we notice that if or then the rest of for and there is not much information we can gain from this. Suppose that is not the case. Then divides the multiplicative order of (because for some ) which means that is in the multiplicative subgroup generated by This is given by the fact that is the unique element in with order (because can not have any more than two roots) and Cauchy's theorem. Hence we must have for some If no such exists, then is certainly not a prime. This is the main condition used in Rabin-Miller.
If gives us a sequence that does not satisfy the above requirement, then is said to be a witness to compositeness, because we can use to prove is composite. That is, testifies that is a composite, hence the choice of word for it.
In algorithm form we get the following.
- Rabin-Miller Algorithm
- Given first calculate and such that and is odd. Then pick a random and calculate If is either or then is not a witness. Try another Otherwise, calculate and up to by squaring the previous term modulo If is encountered before then is a witness and is a composite. Otherwise if and is encountered before then is not a witness. Try another Once "enough" 's have been tried without any witnesses being found, the we can conclude that is "most likely" a prime.
Why is it that at the end we can't conclude with certainty that is a prime? Suppose we pick an and the generated sequence satisfies the requirements. Does that mean is a prime? Answer is no, because for some composites will also satisfy the requirement above too. However, if we pick many possible witnesses and try them all, and they all fail to testify to then we have more and more evidence toward being prime. If we check all such then we can be certain, but then the algorithm would be exponential in again which is what we are avoiding. However, if we could have some idea of the probability of being a witness for a composite then we can come up with a reasonable number of random attempts at witnesses before we can say that is almost certainly a prime.
And this is the key part of Rabin-Miller's paper, where they prove for a given composite at least of numbers are witnesses to being a composite. (The proof for this claim is rather involved, but have a look at the original paper if you are feeling brave!) This means that if we pick random possible witnesses given that is composite, we will have a probability of of none of them being a witness. So picking a value of say will give us a probability of of outputting a false positive, that is, outputting PRIME when the number is a composite. This is good enough for our purposes here.
Also, in practice, one can make the Rabin-Miller algorithm much more efficient by implementing a basic test of divisibility by the first, say, primes before moving on to Rabin-Miller.
Let's look at a Python implementation below.
def rabin_miller_is_prime(n, k=20):
"""
Test n for primality using Rabin-Miller algorithm, with k
random witness attempts. False return means n is certainly a composite.
True return value indicates n is *probably* a prime. False positive
probability is reduced exponentially the larger k gets.
"""
b = basic_is_prime(n, K=100)
if b is not None:
return b
m = n - 1
s = 0
while m % 2 == 0:
s += 1
m //= 2
liars = set()
get_new_x = lambda: random.randint(2, n - 1)
while len(liars) < k:
x = get_new_x()
while x in liars:
x = get_new_x()
xi = pow(x, m, n)
witness = True
if xi == 1 or xi == n - 1:
witness = False
else:
for __ in xrange(s - 1):
xi = (xi ** 2) % n
if xi == 1:
return False
elif xi == n - 1:
witness = False
break
xi = (xi ** 2) % n
if xi != 1:
return False
if witness:
return False
else:
liars.add(x)
return True
In the code above, basic_is_prime simply checks the number against divisibility by the first K numbers. Here's the source for it, which relies on a list primes_list.less_than_hundred_thousand to have been set already.
def basic_is_prime(n, K=-1):
"""Returns True if n is a prime, and False it is a composite
by trying to divide it by two and first K odd primes. Returns
None if test is inconclusive."""
if n % 2 == 0:
return n == 2
for p in primes_list.less_than_hundred_thousand[:K]:
if n % p == 0:
return n == p
return None
Another part of the algorithm above that we get for free in Python but is worth studying a bit further is the pow(x, m, n) function which calculates efficiently. How? The naive algorithm would simply multiply by itself times, but Python's function is smarter than that and uses a method known as "exponentiation by squaring", which runs in time. The basic idea is simple:
Which leads to a divide and conquer algorithm. This is what a simple iterative version of this algorithm would look like in Python. However, use the built-in pow(x, m, n) function in Python instead of this, since it's going to be faster.
def power(x, m, n):
"""Calculate x^m modulo n using O(log(m)) operations."""
a = 1
while m > 0:
if m % 2 == 1:
a = (a * x) % n
x = (x * x) % n
m //= 2
return a
Now, let's try generating some primes using this test instead:
>>> for b in [2 ** i for i in xrange(3, 12)]:
... print "Generating %d-bit prime: " % b
... print generate_random_prime(b, rabin_miller_is_prime)
...
Generating 8-bit prime:
- Running 'generate_random_prime' on Aug 28 2013 - 20:32:32
- Finished 'generate_random_prime', execution time = 0.000s
503
Generating 16-bit prime:
- Running 'generate_random_prime' on Aug 28 2013 - 20:32:32
- Finished 'generate_random_prime', execution time = 0.001s
129757
Generating 32-bit prime:
- Running 'generate_random_prime' on Aug 28 2013 - 20:32:32
- Finished 'generate_random_prime', execution time = 0.002s
5483745739
Generating 64-bit prime:
- Running 'generate_random_prime' on Aug 28 2013 - 20:32:32
- Finished 'generate_random_prime', execution time = 0.003s
20207866191915625427
Generating 128-bit prime:
- Running 'generate_random_prime' on Aug 28 2013 - 20:32:32
- Finished 'generate_random_prime', execution time = 0.008s
378992665877954075225130181634050346399
Generating 256-bit prime:
- Running 'generate_random_prime' on Aug 28 2013 - 20:32:32
- Finished 'generate_random_prime', execution time = 0.013s
169109964058021108360022059334779755034470159052847134197148573143017688247123
Generating 512-bit prime:
- Running 'generate_random_prime' on Aug 28 2013 - 20:32:32
- Finished 'generate_random_prime', execution time = 0.062s
25984244777989501997155542913156869882081307629782603141084479047977114447740881200477139623732813907010625928930923928392846989307780602640371132948572817
Generating 1024-bit prime:
- Running 'generate_random_prime' on Aug 28 2013 - 20:32:32
- Finished 'generate_random_prime', execution time = 0.908s
243882388542316536634494263003432392747710195101405655638525548586460245284788605889744383018972173790715282433484881304387337823469782781741768460522379459266510277700837051129455157916910581124086417098371511903523124351405930407269823757127633787628818261404275424247249951449105500355258546878369871013997
Generating 2048-bit prime:
- Running 'generate_random_prime' on Aug 28 2013 - 20:32:33
- Finished 'generate_random_prime', execution time = 5.533s
39776036539901478897149714325867816317685970320648758660437997010070791355113972360487704959106715808827982189462166321507780789030474348830734451482712904952797349414199357350610796728394943895699307545779410349704150772133800816078777678410296457461265358640627126060911629419050162680462367824593593599185377995313654142814587795430128247012676213933608425620507345628348437045547639588191826106308640857920441463747225809423632900984055482095205841726987368122970422928048300140432181860090536264169603189938581906988427448587564353276787633192654461220520187517077846414138298337591988489586417244684890216725019
As you can see, primes up to bits are generated in negligible time. Even a bit prime is generated in about five seconds which is quite impressive for a rather simple Python implementation.
Finally, let's put it all together to implement RSA, for which we will need an implementation of the extended greatest common divisor algorithm to determine the modular multiplicative inverse of a number.
def extended_gcd(a, b):
"""Returns pair (x, y) such that xa + yb = gcd(a, b)"""
x, lastx, y, lasty = 0, 1, 1, 0
while b != 0:
q, r = divmod(a, b)
a, b = b, r
x, lastx = lastx - q * x, x
y, lasty = lasty - q * y, y
return lastx, lasty
def multiplicative_inverse(e, n):
"""Find the multiplicative inverse of e mod n."""
x, y = extended_gcd(e, n)
if x < 0:
return n + x
return x
def rsa_generate_key(bits):
p = generate_random_prime(bits / 2)
q = generate_random_prime(bits / 2)
# Ensure q != p, though for large values of bits this is
# statistically very unlikely
while q == p:
q = generate_random_prime(bits / 2)
n = p * q
phi = (p - 1) * (q - 1)
# Here we pick a random e, but a fixed value for e can also be used.
while True:
e = random.randint(3, phi - 1)
if fractions.gcd(e, phi) == 1:
break
d = multiplicative_inverse(e, phi)
return (n, e, d)
def rsa_encrypt(message, n, e):
return modular.power(message, e, n)
def rsa_decrypt(cipher, n, d):
return modular.power(cipher, d, n)
And let's look at it in action:
>>> n, e, d = rsa_generate_key(8)
>>> print n, e, d
589 299 419
>>> message = 123
>>> cipher = rsa_encrypt(message, n, e)
>>> print cipher
309
>>> decrypted_message = rsa_decrypt(cipher, n, d)
>>> print decrypted_message
123
And same thing but with a much larger key, giving a more secure encryption scheme:
>>> n, e, d = rsa_generate_key(64)
>>> print n, e, d
49386969680342799959 39516096781065686051 14613413672463512651
>>> message = 123
>>> cipher = rsa_encrypt(message, n, e)
>>> print cipher
19163520560172629876
>>> decrypted_message = rsa_decrypt(cipher, n, d)
>>> print decrypted_message
123
And there it is. A very basic implementation of RSA that is still capable of handling rather large keys. Notice that the encryption and decryption algorithms are basically just modular exponentiation. Because of its importance in RSA's efficiency, modular exponentiation has been studied quite a bit in applied cryptography. A more efficient implementation would be using Montgomery reduction which I might go into in a future post.
Appendix: Basic Number Theory Disguised as Group Theory
A few results from group theory that we use above are reviewed and proved here. Most of these can also be expressed as results in number theory in less abstract forms, but let's be honest, they look way cooler and are much easier to remember when they are written in the language of group theory.
Remember that for element in group we define the order of as to be the smallest positive integer such that if such a number exists, and otherwise.
- Theorem
- For any element in group iff divides Proof If for some integer then Conversely, suppose Let be such that and Then Hence which means giving
- Theorem
- Given group if has finite order then so does for any integer and furthermore
Proof Let and We need to show First, since divides both and we have and giving
This means divides On the other hand, since by definition. This also means that divides So for some integer This gives which simplifies to by cancelling from both sides. Now, and are relatively prime since we already cancelled out their greatest common divisor Since is a divisor then it must divide So we have have dividing and dividing giving equality as needed.
We only state the following important result from group theory and use it, without proof. A proof can found in most basic group theory text books and is achieved by considering the cosets of the subgroup
- Lagrange's Theorem
- For any finite group and any subgroup of we have divides
- Corollary
- For any finite group and any we have Proof By Lagrange's theorem divides The result then follows from the first theorem in this section.
Comments