Understanding RSA and its Vulnerabilities – Teaching Aide

Meet our team:

  • Faizah Kolapo
  • Gurkaran Singh .
  • Rupesh Kowtharapu
  • George Chukwuemeka

Brief Introduction to the Project:

Cryptography plays a key role in safeguarding our information and this is embedded in a lot of applications/devices we use today. This teaching aide will take you on a journey through understanding the fundamental concepts of the RSA cryptosystem, how authenticity is integrated, as well as potential vulnerabilities to keep in mind while implementing this cryptosystem.

It is important to note that the list of vulnerabilities or attacks is exhaustive and cannot be covered in one video. After watching the video, if interested, we urge you to look into more attacks to gain a better understanding of the security of RSA. This teaching aide is engaging and will definitely be worth your time.

For some reflection, we will be posting discussion questions in the comments. Please feel free to engage with them to assess how much of the RSA cryptosystem you now understand.

Click here to access the teaching aide. Don’t worry, the link is safe to click 😉

Join the Conversation

2 Comments

  1. As mentioned above, here are some discussion questions to assess your knowledge of the topic after watching the teaching aide:
    1) Why is RSA an asymmetric cryptosystem and what role do digital signatures play in this? Give some examples of real-world applications of RSA.
    2) Why is it important to use larger public exponents in RSA and what are we trying to address by doing this? How does it improve the security of the process?
    3) What are some other attacks on RSA, and how can they be prevented?

Leave a comment