Key Generation Using Generalized Pell's Equation in Public Key Cryptography Based on the Prime Fake Modulus Principle to Image Encryption and Its Security Analysis

被引:9
|
作者
Raghunandan, K. R. [1 ,2 ]
Ganesh, Aithal [2 ,3 ]
Surendra, Shetty [1 ,2 ]
Bhavya, K. [2 ,4 ]
机构
[1] NMAM Inst Technol, Dept Comp Sci & Engn, Nitte, India
[2] Visvesaraya Technol Univ, Belagavi, Karnataka, India
[3] Shri Madhwa Vadiraja Inst Technol & Management, Dept Elect & Commun, Bantakal, Udupi, India
[4] NMAM Inst Technol, Dept Math, Nitte, India
关键词
Public Key Cryptography; Fermat's Factorization; Standard Deviation; Pell's Equation; Wiener's Attack; Trial and Division; RSA CRYPTOSYSTEM; ATTACKS; EXPONENT; CRYPTANALYSIS;
D O I
10.2478/cait-2020-0030
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RSA is one among the most popular public key cryptographic algorithm for security systems. It is explored in the results that RSA is prone to factorization problem, since it is sharing common modulus and public key exponent. In this paper the concept of fake modulus and generalized Pell's equation is used for enhancing the security of RSA. Using generalized Pell's equation it is explored that public key exponent depends on several parameters, hence obtaining private key parameter itself is a big challenge. Fake modulus concept eliminates the distribution of common modulus, by replacing it with a prime integer, which will reduce the problem of factorization. It also emphasizes the algebraic cryptanalysis methods by exploring Fermat's factorization, Wiener's attack, and Trial and division attacks.
引用
收藏
页码:86 / 101
页数:16
相关论文
共 9 条
  • [1] Key Generation and Security Analysis of Text Cryptography using Cubic Power of Pell's Equation
    Raghunandan, K. R.
    Shetty, Rashmitha
    Aithal, Ganesh
    [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, INSTRUMENTATION AND CONTROL TECHNOLOGIES (ICICICT), 2017, : 1496 - 1500
  • [2] Pell's RSA key generation and its security analysis
    Segar, Chandra T.
    Vijayaragavan, R.
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [3] Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography
    Zhao, Tieyu
    Ran, Qiwen
    Yuan, Lin
    Chi, Yingying
    Ma, Jing
    [J]. OPTICS AND LASERS IN ENGINEERING, 2015, 72 : 12 - 17
  • [4] Security analysis of public-key encryption scheme based on neural networks and its implementing
    Liu, Niansheng
    Guo, Donghui
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1327 - 1330
  • [5] Security analysis of public-key encryption scheme based on neural networks and its implementing
    Liu, Niansheng
    Guo, Donghui
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 443 - +
  • [6] Security analysis of public-key encryption scheme based on neural networks and its implementing
    Liu, Niansheng
    Guo, Donghui
    [J]. Int. Conf. Comput. Intell. Secur. ICCIAS, 2006, (1327-1330):
  • [7] A big-data security mechanism based on fully homomorphic encryption using cubic spline curve public key cryptography
    Krishna, Addepalli V. N.
    [J]. JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (06): : 1387 - 1399
  • [8] An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System
    Kavitha, S.
    Alphonse, P. J. A.
    Reddy, Y. Venkataramana
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2019, 43 (08)
  • [9] An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System
    S. Kavitha
    P. J. A. Alphonse
    Y. Venkataramana Reddy
    [J]. Journal of Medical Systems, 2019, 43