Hybrid Security RSA Algorithm in Application of Web Service

被引:2
|
作者
Gondaliya, Jayraj [1 ]
Savani, Jinisha [1 ]
Dhaduvai, Vivek Sheetal [1 ]
Hossain, Gahangir [1 ]
机构
[1] Texas A&M Univ, Elect Engn & Comp Sci, Kingsville, TX 78363 USA
关键词
RSA; Cryptosystem; Network Security; Cyber systems;
D O I
10.1109/ICDIS.2018.00032
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A new hybrid security algorithm is presented for RSA cryptosystem named as Hybrid RSA. The system works on the concept of using two different keys-a private and a public for decryption and encryption processes. The value of public key (P) and private key (Q) depends on value of M, where M is the product of four prime numbers which increases the factorizing of variable M. moreover, the computation of P and Q involves computation of some more factors which makes it complex. This states that the variable x or M is transferred during encryption and decryption process, where x represents the multiplication of two prime numbers A and B. thus, it provides more secure path for encryption and decryption process. The proposed system is compared with the RSA and enhanced RSA (ERSA) algorithms to measure the key generation time, encryption and decryption time which is proved to be more efficient than RSA and ERSA.
引用
下载
收藏
页码:149 / 152
页数:4
相关论文
共 50 条
  • [21] A Security Architecture For Web Service
    Luo Fuqiang
    Xiong Yongfu
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 499 - 502
  • [22] The practical application of a process for eliciting and designing security in web service systems
    Gutierrez, Carlos
    Rosado, David G.
    Fernandez-Medina, Eduardo
    INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (12) : 1712 - 1738
  • [23] Proposed hybrid RSA algorithm for cloud computing
    Rohini
    Sharma, Er Tejinder
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 60 - 64
  • [24] Security Analysis of RSA Cryptosystem Algorithm and it's Properties
    Liu, Chenglian
    Guo, Yongning
    Lin, Juan
    INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2014 (ICCMSE 2014), 2014, 1618 : 468 - 470
  • [25] Research on RSA and Hill hybrid encryption algorithm
    Yang, Hongyu
    Ning, Yuguang
    Wang, Yue
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 20 (01) : 1 - 6
  • [26] Enhancement of Security Using B-RSA Algorithm
    Gupta, Aman
    Gupta, Saurabh
    Yadav, Nishi
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 439 - 450
  • [27] A Modified RSA Algorithm to Enhance Security for Digital Signature
    Jaju, Sangita A.
    Chowhan, Santosh S.
    2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
  • [28] ANALYSIS AND DESIGN OF ENHANCED RSA ALGORITHM TO IMPROVE THE SECURITY
    Mathur, Shikha
    Goar, Vishal
    Gupta, Deepika
    Kuri, Manoj
    2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [29] Application of an Improved Hungarian Algorithm in Semantic WEB Service Discovery
    Zhou Ning
    Song ZiLin
    Ai WeiHua
    Zhou LiMing
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 5422 - +
  • [30] A Hybrid Strategy Improved Whale Optimization Algorithm for Web Service Composition
    Ju, Chuanxiang
    Ding, Hangqi
    Hu, Benjia
    COMPUTER JOURNAL, 2023, 66 (03): : 662 - 677