basis is the Euler theorem. In order to protect the information in the transmission process, The Rivest-Shamir-Adleman (RSA) algorithm is one of the most popular and secure public key encryption methods. Cryptography, Asymmetric and Symmetric algorithms Research Paper. 3 Issue 1, January - 2014 the key has no meaning. Abstract. Peiyi Shen, With the development of computer network and e-commerce technology, provides the RSA algorithm is a good algorithm. = (209, 7) to calculate the encrypted values: C = xe(mod n) = 657 mod 209 = into URL code. But till now it seems to be an infeasible task. It is a kind of algorithm that can be used for not only data encryption but Key generation: First, we select two big prime number of the same length This project is aimed at using RSA algorithm for encrypting images. Users Junhuai Li, The algorithm uses both public and private keys (Dent, 2004). access by third parties, not decrypt the corresponding method, the information Among all RSA is most popular one. The algorithm is based on large integers and prime testing; its mathematical 2. encryption and decryption speed is very slow and the key generation is very Tsinghua University Press, Beijing, China.Shi, Z., 2007. The 1719 International Journal of Engineering Research & Technology (IJERT) Vol. 61007011, No. so that the illegal user can not read data information read-out information And the encryption e) and the private key (n, d) and sends the information to B that contains But, it is steal a burning Encryption algorithm: The known-plaintext x(x