	R S A   O U T L I N E

  I	Public Key Encryption Algorithms
	A.  What they are.
	    1.  Simple example with Alice and Bob
	    2.  Quick mathematical formula-type thing
	    3.  Methods of use
	B.  Trapdoor functions and their relationship to PKE
	    1.  How trapdoor functions relate to pke.
	    2.  Modular arithmetic as a trapdoor function

 II	The RSA encryption algorithm
	A.  Security (finding and factoring large numbers)
	B.  Finding keys (finding large primes).
	C.  Encryption
	D.  Decryption

III	Implementation of the RSA encryption algorithm
	A.  makekey.C
	B.  rsa_encrypt.C
	C.  rsa_decrypt.C
	D.  Problems with this implementation

 IV	Correctness of the RSA encryption algorithm
	A.  Encryption and Decryption formulae are inverse transformations.

  V     Program Listings
	A.  makekey.C
	B.  rsa_encrypt.C
	C.  rsa_decrypt.C

Appendices:
	A.  Notation and Pseudocode conventions.

Bibliography









	
