A comparitive study of RSA based cryptographic algorithms

被引:0
|
作者
Haraty, RA [1 ]
El-Kassar, AN [1 ]
Otrok, H [1 ]
机构
[1] Lebanese Amer Univ, Beirut 11022801, Lebanon
来源
INTELLIGENT AND ADAPTIVE SYSTEMS AND SOFTWARE ENGINEERING | 2004年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In 1978 a powerful and practical public-key scheme Hadi Otrokwas produced by RSA; there work was applied using 2 large random odd primes p and q, each roughly of the same size. El-Kassar and Awad modi...ed the RSA public-key encryption scheme from the domain of natural integers, Z, to two principal ideal domains, namely the domain of Gaussian integers, Z[i], and the domain of the rings of polynomials over...nite elds, F [x], by extending the arithmetic needed for the modi...cations to these domains. In this work we implement the classical and modi...ed RSA cryptosystem to compare and to test their functionality, realiability and security. To test the security of the algorithms we implement an attack algorithm to solve the integer factorization problem. After factorization is found, the RSA problem could be solved by computing the order (C)(n), and then ...nding the private key using the extended Euclidean algorithm for integers.
引用
收藏
页码:183 / 188
页数:6
相关论文
共 50 条
  • [1] Comparison of Cryptographic Algorithms GOST and RSA
    Achmad, R. B. N.
    2ND INTERNATIONAL CONFERENCE ON INFORMATICS, ENGINEERING, SCIENCE, AND TECHNOLOGY (INCITEST 2019), 2019, 662
  • [2] A protocol for designated conflrmer signatures based on RSA cryptographic algorithms
    Li, P
    Lin, YP
    AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 403 - 406
  • [3] Towards an optimal multicore processor design for cryptographic algorithms - A case study on RSA
    Al-Tarawneh, Mutaz
    Alkhresheh, Ashraf
    WSEAS Transactions on Computers, 2014, 13 : 54 - 77
  • [4] A Note on Time and Space Complexity of RSA and ElGamal Cryptographic Algorithms
    Emmanuel, Adeniyi Abidemi
    Aderemi, Okeyinka E.
    Marion, Adebiyi O.
    Emmanuel, Asani O.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (07) : 143 - 147
  • [5] Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions
    Adeniyi, Emmanuel A.
    Falola, Peace Busola
    Maashi, Mashael S.
    Aljebreen, Mohammed
    Bharany, Salil
    INFORMATION, 2022, 13 (10)
  • [6] A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish
    Patil, Priyadarshini
    Narayankar, Prashant
    Narayan, D. G.
    Meena, S. M.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 617 - 624
  • [7] Cryptographic Algorithms Benchmarking: A Case Study
    Boicea, Alexandru
    Truica, Ciprian-Octavian
    Radulescu, Florin
    Popeanga, Daniel-Calin
    Radulescu, Iulia Maria
    Costea, Cristina
    VISION 2025: EDUCATION EXCELLENCE AND MANAGEMENT OF INNOVATIONS THROUGH SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE, 2019, : 1509 - 1517
  • [8] Energy Consumption Analysis of the Cryptographic Key Generation Process of RSA and ECC Algorithms in Embedded Systems
    Oliveira, P. R. D.
    Martimiano, L. A. F.
    Feltrim, V. D.
    Zanoni, G. B. M.
    IEEE LATIN AMERICA TRANSACTIONS, 2014, 12 (06) : 1141 - 1148
  • [9] The Iso-RSA Cryptographic Scheme
    Wade, Mamadou, I
    2022 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2022, : 355 - 364
  • [10] An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA
    Zhang, Chunfu
    Liang, Yanchun
    Tavares, Adriano
    Wang, Lidong
    Gomes, Tiago
    Pinto, Sandro
    SYMMETRY-BASEL, 2024, 16 (03):