This is a java program to implement RSA algorithm. RSA is one of the first practicable public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and differs from the decryption key which is kept secret. In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem. RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman.
Here is the source code of the Java Program to Implement the RSA Algorithm. The Java program is successfully compiled and run on a Windows system. The program output is also shown below.
package com.maixuanviet.setandstring;
import java.io.DataInputStream;
import java.io.IOException;
import java.math.BigInteger;
import java.util.Random;
public class RSA
{
private BigInteger p;
private BigInteger q;
private BigInteger N;
private BigInteger phi;
private BigInteger e;
private BigInteger d;
private int bitlength = 1024;
private Random r;
public RSA()
{
r = new Random();
p = BigInteger.probablePrime(bitlength, r);
q = BigInteger.probablePrime(bitlength, r);
N = p.multiply(q);
phi = p.subtract(BigInteger.ONE).multiply(q.subtract(BigInteger.ONE));
e = BigInteger.probablePrime(bitlength / 2, r);
while (phi.gcd(e).compareTo(BigInteger.ONE) > 0 && e.compareTo(phi) < 0)
{
e.add(BigInteger.ONE);
}
d = e.modInverse(phi);
}
public RSA(BigInteger e, BigInteger d, BigInteger N)
{
this.e = e;
this.d = d;
this.N = N;
}
@SuppressWarnings("deprecation")
public static void main(String[] args) throws IOException
{
RSA rsa = new RSA();
DataInputStream in = new DataInputStream(System.in);
String teststring;
System.out.println("Enter the plain text:");
teststring = in.readLine();
System.out.println("Encrypting String: " + teststring);
System.out.println("String in Bytes: "
+ bytesToString(teststring.getBytes()));
// encrypt
byte[] encrypted = rsa.encrypt(teststring.getBytes());
// decrypt
byte[] decrypted = rsa.decrypt(encrypted);
System.out.println("Decrypting Bytes: " + bytesToString(decrypted));
System.out.println("Decrypted String: " + new String(decrypted));
}
private static String bytesToString(byte[] encrypted)
{
String test = "";
for (byte b : encrypted)
{
test += Byte.toString(b);
}
return test;
}
// Encrypt message
public byte[] encrypt(byte[] message)
{
return (new BigInteger(message)).modPow(e, N).toByteArray();
}
// Decrypt message
public byte[] decrypt(byte[] message)
{
return (new BigInteger(message)).modPow(d, N).toByteArray();
}
}
Output:
$ javac RSA.java $ java RSA Enter the plain text: MaiXuanViet Encrypting String: MaiXuanViet String in Bytes: 8397110102111117110100114121 Decrypting Bytes: 8397110102111117110100114121 Decrypted String: MaiXuanViet
Related posts:
Validate email address exists or not by Java Code
Adding Shutdown Hooks for JVM Applications
Java Program to Check Whether an Input Binary Tree is the Sub Tree of the Binary Tree
Java Program to Implement ArrayBlockingQueue API
Java Program to Check Whether a Weak Link i.e. Articulation Vertex Exists in a Graph
Java Program to Perform Matrix Multiplication
An Example of Load Balancing with Zuul and Eureka
Guide To CompletableFuture
Java Program to Implement Fibonacci Heap
Jackson Unmarshalling JSON with Unknown Properties
Java String Conversions
Java IO vs NIO
Guide to Dynamic Tests in Junit 5
How to Read a Large File Efficiently with Java
HttpClient 4 Cookbook
Sending Emails with Java
Java Program to Optimize Wire Length in Electrical Circuit
How to Get a Name of a Method Being Executed?
Java 14 Record Keyword
Create a Custom Exception in Java
Thao tác với tập tin và thư mục trong Java
Introduction to Spring Data REST
Spring Data JPA Delete and Relationships
Giới thiệu Json Web Token (JWT)
Working with Network Interfaces in Java
Java Program to Check whether Graph is a Bipartite using 2 Color Algorithm
Java Program to Construct an Expression Tree for an Prefix Expression
Java Program to Generate Random Numbers Using Multiply with Carry Method
Java Program to Find Inverse of a Matrix
A Guide to JUnit 5
Java Program to Implement the Vigenere Cypher
A Guide to the Java LinkedList