Enhanced RSA Algorithm using Fake Modulus and Fake Public Key Exponent

被引:0
|
作者
Raghunandhan, K. R. [1 ]
Shetty, Surendra [2 ]
Aithal, Ganesh [3 ]
Rakshith, N. [1 ]
机构
[1] NMAM Inst Technol, Dept CSE, Nitte, India
[2] NMAM Inst Technol, Dept MCA, Nitte, India
[3] MITE, Dept CSE, Moodabidre, India
关键词
Public key cryptography; Fermat factorization; Euler's function; wieners attack;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In cryptography Public key cryptography plays an important role in the field of data communication. Public key uses two different keys where keys are associated in such a way that, the public key can use to encrypt the data and private key is used to decrypt. RSA is considered as one of the efficient algorithm in public key cryptography. Efficiency of RSA Algorithm mainly depends on how effectively public key components is shared i.e. modulus n and public key exponent e. If these components compromised using mathematical attack, obtaining private key becomes easier job for the intruder. In this paper an enhanced RSA algorithm is proposed to increase the factoring complexity of the public keys, we use fake public key exponent f instead of e and modulus X instead of 'n'. Results of our scheme overcome the limitations of Integer factorization attack. Paper also gives comparative analysis of the proposed work using standard metrics.
引用
收藏
页码:755 / 759
页数:5
相关论文
共 50 条
  • [41] A New Improved Bound for Short Decryption Exponent on RSA Modulus N = pq Using Wiener's Method
    Abubakar, S., I
    Ariffin, M. R. K.
    Asbullah, M. A.
    [J]. MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2019, 13 : 89 - 99
  • [42] An enhanced graph-based semi-supervised learning algorithm to detect fake users on Twitter
    BalaAnand, M.
    Karthikeyan, N.
    Karthik, S.
    Varatharajan, R.
    Manogaran, Gunasekaran
    Sivaparthipan, C. B.
    [J]. JOURNAL OF SUPERCOMPUTING, 2019, 75 (09): : 6085 - 6105
  • [43] Embedment Of Montgomery Algorithm On Elliptic Curve Cryptography Over RSA Public Key Cryptography
    Thomas, Aswathi
    Manuel, Ebin M.
    [J]. INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 : 911 - 917
  • [44] Fake Profile Detection Using Logistic Regression and Gradient Descent Algorithm on Online Social Networks
    Raja, Eswara Venkata Sai
    Aditya, Bhrugumalla L. V. S.
    Mohanty, Sachi Nandan
    [J]. EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2024, 11 (01)
  • [45] Fake calibration attack using a beam sampler in a continuous variable-quantum key distribution system
    Lopez-Leyva, J. A.
    Talamantes-Alvarez, A.
    Mejia, E. A.
    Estrada, J.
    Ponce Camacho, M.
    Ramos Garcia, V
    Casemiro Oliveira, L.
    [J]. REVISTA MEXICANA DE FISICA, 2020, 66 (02) : 228 - 231
  • [46] Optimizing fake news detection for Arabic context: A multitask learning approach with transformers and an enhanced Nutcracker Optimization Algorithm
    Dahou, Abdelghani
    Ewees, Ahmed A.
    Hashim, Fatma A.
    Al-qaness, Mohammed A. A.
    Orabi, Dina Ahmed
    Soliman, Eman M.
    Tag-eldin, Elsayed M.
    Aseeri, Ahmad O.
    Abd Elaziz, Mohamed
    [J]. KNOWLEDGE-BASED SYSTEMS, 2023, 280
  • [47] An improved Montgomery's algorithm for high-speed RSA public-key cryptosystem
    Su, CY
    Hwang, SA
    Chen, PS
    Wu, CW
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 1999, 7 (02) : 280 - 284
  • [48] An Enhanced Security Algorithm for Wireless Application using RSA and Genetic Approach
    Prema, G.
    Natarajan, S.
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [49] Loop-based RSA Key Generation Algorithm using String Identity
    Muhammad, Norhidayah
    Zain, Jasni Mohamad
    Saman, Md Yazid Mohd
    [J]. 2013 13TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2013), 2013, : 255 - 258
  • [50] Improving Fake News Detection by Using an Entity-enhanced Framework to Fuse Diverse Multimodal Clues
    Qi, Peng
    Cao, Juan
    Li, Xirong
    Liu, Huan
    Sheng, Qiang
    Mi, Xiaoyue
    He, Qin
    Lv, Yongbiao
    Guo, Chenyang
    Yu, Yingchao
    [J]. PROCEEDINGS OF THE 29TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2021, 2021, : 1212 - 1220