Modified Trial Division Algorithm Using KNJ-Factorization Method To Factorize RSA Public Key Encryption

被引:0
|
作者
Lal, Nidhi [1 ]
Singh, Anurag Prakash [1 ]
Kumar, Shishupal [1 ]
机构
[1] Indian Inst Informat Technol, Wireless Commun & Comp, Allahabad, Uttar Pradesh, India
关键词
RSA Algorithm; Factorization; Prime Numbers; Odd Numbers;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of RSA algorithm depends upon the positive integer N, which is the multiple of two precise large prime numbers. Factorization of such great numbers is a problematic process. There are many algorithms has been implemented in the past years. The offered KNJ-Factorization algorithm contributes a deterministic way to factorize RSA N=p*q. The algorithm limits the search by only considering the prime values. Subsequently prime numbers are odd numbers (apart from 2) accordingly it also requires smaller number steps to factorize RSA. In this paper, the anticipated algorithm is very simple besides it is very easy to understand and implement. The main concept of this KNJ-factorization algorithm is, to check only those factors which are odd and prime. The proposed KNJ-Factorization algorithm works very efficiently on those factors; which are adjoining and close to root N. The proposed factorization method can speed up if we can reduce the time for primality testing. It fundamentally decreases the time complexity.
引用
收藏
页码:992 / 995
页数:4
相关论文
共 34 条
  • [21] Modification of AES Algorithm by Using Second Key and Modified SubBytes Operation for Text Encryption
    Thinn, Aye Aye
    Thwin, Mie Mie Su
    [J]. COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 435 - 444
  • [22] LRSA-Hybrid Encryption Method Using Linear Cipher and RSA Algorithm to Conceal the Text Messages
    Zheng, Rundan
    Chuah, Chai Wen
    Alawatugoda, Janaka
    [J]. International Journal of Advanced Computer Science and Applications, 2024, 15 (11) : 1164 - 1172
  • [23] Modified Method for Reducing the Order of LTISystem using Factor Division Algorithm
    Tiwari, Sharad Kumar
    Kaur, Gagandeep
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 1780 - 1786
  • [24] Key management of the double random-phase-encoding method using public-key encryption
    Saini, Nirmala
    Sinha, Aloka
    [J]. OPTICS AND LASERS IN ENGINEERING, 2010, 48 (03) : 329 - 334
  • [25] Modified OTP Based Vernam Cipher Algorithm using Multilevel Encryption Method
    Brosas, Deborah G.
    Sison, Ariel M.
    Medina, Ruji P.
    [J]. PROCEEDINGS OF THE 2019 IEEE EURASIA CONFERENCE ON IOT, COMMUNICATION AND ENGINEERING (ECICE), 2019, : 201 - 204
  • [26] An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm
    Zhang, Bing
    Sang, Jun
    Alam, Mohammad. S.
    [J]. OPTICAL PATTERN RECOGNITION XXIV, 2013, 8748
  • [27] An Efficient Algorithm for Key Generation in Advance Encryption Standard using Sudoku Solving Method
    Indrani, B.
    Veni, M. Karthigai
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 858 - 865
  • [28] Cellular-array modular multiplier for fast RSA public-key cryptosystem based on modified Booth's algorithm
    Hong, JH
    Wu, CW
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2003, 11 (03) : 474 - 484
  • [29] Efficient Public Key Encryption with Disjunctive Keywords Search Using the New Keywords Conversion Method
    Zhang, Yu
    Li, Yin
    Wang, Yifan
    [J]. INFORMATION, 2018, 9 (11)
  • [30] Data encryption method using CP-ABE with symmetric key algorithm in blockchain network
    Lee, Taerim
    Moon, Ho-se
    Jang, Juwook
    [J]. 12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, : 1371 - 1373