Enhanced RSA Algorithm using Fake Modulus and Fake Public Key Exponent

被引:0
|
作者
Raghunandhan, K. R. [1 ]
Shetty, Surendra [2 ]
Aithal, Ganesh [3 ]
Rakshith, N. [1 ]
机构
[1] NMAM Inst Technol, Dept CSE, Nitte, India
[2] NMAM Inst Technol, Dept MCA, Nitte, India
[3] MITE, Dept CSE, Moodabidre, India
关键词
Public key cryptography; Fermat factorization; Euler's function; wieners attack;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In cryptography Public key cryptography plays an important role in the field of data communication. Public key uses two different keys where keys are associated in such a way that, the public key can use to encrypt the data and private key is used to decrypt. RSA is considered as one of the efficient algorithm in public key cryptography. Efficiency of RSA Algorithm mainly depends on how effectively public key components is shared i.e. modulus n and public key exponent e. If these components compromised using mathematical attack, obtaining private key becomes easier job for the intruder. In this paper an enhanced RSA algorithm is proposed to increase the factoring complexity of the public keys, we use fake public key exponent f instead of e and modulus X instead of 'n'. Results of our scheme overcome the limitations of Integer factorization attack. Paper also gives comparative analysis of the proposed work using standard metrics.
引用
收藏
页码:755 / 759
页数:5
相关论文
共 50 条
  • [11] Cryptanalysis of large RSA exponent by using the LLL algorithm
    Chen, CY
    Ku, CY
    Yen, DC
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 516 - 525
  • [12] PROOF CHECKING THE RSA PUBLIC KEY ENCRYPTION ALGORITHM
    BOYER, RS
    MOORE, JS
    [J]. AMERICAN MATHEMATICAL MONTHLY, 1984, 91 (03): : 181 - 189
  • [13] Implementation of RSA Encryption Using Identical Modulus Algorithm
    Osseily, Hassan Amine
    Haidar, Ali Massoud
    Kassem, Abdallah
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2597 - +
  • [14] Fake Data Analysis and Detection Using Ensembled Hybrid Algorithm
    Reddy, Palagati Bhanu Prakash
    Reddy, Mandi Pavan Kumar
    Reddy, Ganjikunta Venkata Manaswini
    Mehata, K. M.
    [J]. PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 890 - 897
  • [15] A Research on Fake News Detection Using Machine Learning Algorithm
    Shrivastava, Sagar
    Singh, Rishika
    Jain, Charu
    Kaushal, Shivangi
    [J]. SMART SYSTEMS: INNOVATIONS IN COMPUTING (SSIC 2021), 2022, 235 : 273 - 287
  • [16] Fake Video News Detection Using Deep Learning Algorithm
    Pimple, Kanchan M.
    Solanke, Ravindra R.
    Likhitkar, Praveen P.
    Pande, Sagar
    [J]. PROCEEDINGS OF THIRD DOCTORAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE, DOSCI 2022, 2023, 479 : 851 - 857
  • [17] FAST DECIPHERMENT ALGORITHM FOR RSA PUBLIC-KEY CRYPTOSYSTEM
    QUISQUATER, JJ
    COUVREUR, C
    [J]. ELECTRONICS LETTERS, 1982, 18 (21) : 905 - 907
  • [18] Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm
    Zhao, Tieyu
    Ran, Qiwen
    Yuan, Lin
    Chi, Yingying
    Ma, Jing
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [19] Fake News Classification using transformer based enhanced LSTM and BERT
    Rai, Nishant
    Kumar, Deepika
    Kaushik, Naman
    Raj, Chandan
    Ali, Ahad
    [J]. International Journal of Cognitive Computing in Engineering, 2022, 3 : 98 - 105
  • [20] An Efficient Parallel Algorithm for Secured Data Communications Using RSA Public Key Cryptography Method
    Saxena, Sapna
    Kapoor, Bhanu
    [J]. SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 850 - 854