An Algorithm to Enhance Security in RSA

被引:0
|
作者
Minni, Rohit [1 ]
Sultania, Kaushal [1 ]
Mishra, Saurabh [1 ]
Vincent, Durai Raj [1 ]
机构
[1] VIT Univ, Vellore, Tamil Nadu, India
来源
2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT) | 2013年
关键词
RSA; Security; Encryption; Complexity; Public key; Private key;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In symmetric key cryptography the sender as well as the receiver possess a common key. Asymmetric key cryptography involves generation of two distinct keys which are used for encryption and decryption correspondingly. The sender converts the original message to cipher text using the public key while the receiver can decipher this using his private key. This is also called Public Key Cryptography. For every public key there can exist only one private key that can decipher the encrypted text. Security of RSA Algorithm can be compromised using mathematical attack, by guessing the factors of a large number. It may also be compromised if one can guess the private key. In accordance with the mathematical attack, we propose a secure algorithm in this paper. In this algorithm, we try to eliminate the distribution of n which is the large number whose factors if found compromises the RSA algorithm. We also present a comparative analysis of the proposed algorithm with the RSA algorithm.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] An Enhanced Security Algorithm for Wireless Application using RSA and Genetic Approach
    Prema, G.
    Natarajan, S.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [22] Implication of Genetic Algorithm in Cryptography to Enhance Security
    Nazeer, Muhammad Irshad
    Mallah, Ghulam Ali
    Shaikh, Noor Ahmed
    Bhatra, Rakhi
    Memon, Raheel Ahmed
    Mangrio, Muhammad Ismail
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (06) : 375 - 379
  • [23] On the security of RSA screening
    Coron, JS
    Naccache, D
    PUBLIC KEY CRYPTOGRAPHY, 1999, 1560 : 197 - 203
  • [24] Parallel GNFS algorithm integrated with parallel block Wiedemann algorithm for RSA security in cloud computing
    Yang, Laurence T.
    Huang, Gaoyuan
    Feng, Jun
    Xu, Li
    INFORMATION SCIENCES, 2017, 387 : 254 - 265
  • [25] Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa & Aes) Encryption Algorithm
    Mahalle, Vishwanath S.
    Shahade, Aniket K.
    2014 INTERNATIONAL CONFERENCE ON POWER, AUTOMATION AND COMMUNICATION (INPAC), 2014, : 146 - 149
  • [26] RSA Encryption Algorithm Optimization to Improve Performance and Security Level of Network Messages
    Meneses, Fausto
    Fuertes, Walter
    Sancho, Jose
    Salvador, Santiago
    Flores, Daniela
    Aules, Hernan
    Castro, Fidel
    Torres, Jenny
    Miranda, Alba
    Nuela, Danilo
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (08): : 55 - 62
  • [27] Generation of Dynamic Table Using Magic Square to Enhance the Security for the ASCII CODE Using RSA
    N. G. Pooja
    K. Mani
    Uma Devi
    S. Kumar Chandar
    SN Computer Science, 5 (7)
  • [28] Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique
    Kousalya A.
    Baik N.-K.
    International Journal of Intelligent Networks, 2023, 4 : 62 - 67
  • [29] On the security of RSA encryption in TLS
    Jonsson, J
    Kaliski, BS
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 127 - 142
  • [30] Security dynamics buys RSA
    Davis, S
    INTERNET WORLD, 1996, 7 (07): : 18 - 18