Enhanced RSA Algorithm using Fake Modulus and Fake Public Key Exponent

被引:0
|
作者
Raghunandhan, K. R. [1 ]
Shetty, Surendra [2 ]
Aithal, Ganesh [3 ]
Rakshith, N. [1 ]
机构
[1] NMAM Inst Technol, Dept CSE, Nitte, India
[2] NMAM Inst Technol, Dept MCA, Nitte, India
[3] MITE, Dept CSE, Moodabidre, India
关键词
Public key cryptography; Fermat factorization; Euler's function; wieners attack;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In cryptography Public key cryptography plays an important role in the field of data communication. Public key uses two different keys where keys are associated in such a way that, the public key can use to encrypt the data and private key is used to decrypt. RSA is considered as one of the efficient algorithm in public key cryptography. Efficiency of RSA Algorithm mainly depends on how effectively public key components is shared i.e. modulus n and public key exponent e. If these components compromised using mathematical attack, obtaining private key becomes easier job for the intruder. In this paper an enhanced RSA algorithm is proposed to increase the factoring complexity of the public keys, we use fake public key exponent f instead of e and modulus X instead of 'n'. Results of our scheme overcome the limitations of Integer factorization attack. Paper also gives comparative analysis of the proposed work using standard metrics.
引用
收藏
页码:755 / 759
页数:5
相关论文
共 50 条
  • [1] ON USING RSA WITH LOW EXPONENT IN A PUBLIC KEY NETWORK
    HASTAD, J
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 403 - 408
  • [2] An Enhanced Parallel Version of RSA Public Key Crypto Based Algorithm Using OpenMP
    Saxena, Rahul
    Jain, Monika
    Singh, Dushyant
    Kushwah, Ashutosh
    [J]. SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 37 - 42
  • [3] Modified RSA Public Key Algorithm
    Aswathy, B. G.
    Resmi, R.
    [J]. 2014 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL SYSTEMS AND COMMUNICATIONS (ICCSC), 2014, : 252 - 255
  • [4] Using RSA with low exponent in a public network
    Lee, WB
    Chang, CC
    [J]. COMPUTER COMMUNICATIONS, 1998, 21 (03) : 284 - 286
  • [5] Fake News Detection Using Enhanced BERT
    Aljawarneh, Shadi A.
    Swedat, Safa Ahmad
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, 11 (04): : 4843 - 4850
  • [6] Key Generation Using Generalized Pell's Equation in Public Key Cryptography Based on the Prime Fake Modulus Principle to Image Encryption and Its Security Analysis
    Raghunandan, K. R.
    Ganesh, Aithal
    Surendra, Shetty
    Bhavya, K.
    [J]. CYBERNETICS AND INFORMATION TECHNOLOGIES, 2020, 20 (03) : 86 - 101
  • [7] Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm
    Kim, Yoonjeong
    Ohm, SeongYong
    Yi, Kang
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (03): : 545 - 547
  • [8] Real and fake emotion detection using enhanced boosted support vector machine algorithm
    Annadurai, Swaminathan
    Arock, Michael
    Vadivel, A.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (01) : 1333 - 1353
  • [9] Remarks on using RSA with low exponent in a public network
    He, WH
    Wu, TC
    Lin, CY
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2002, 18 (02) : 341 - 344
  • [10] Real and fake emotion detection using enhanced boosted support vector machine algorithm
    Swaminathan Annadurai
    Michael Arock
    A. Vadivel
    [J]. Multimedia Tools and Applications, 2023, 82 : 1333 - 1353