An Algorithm to Enhance Security in RSA

被引:0
|
作者
Minni, Rohit [1 ]
Sultania, Kaushal [1 ]
Mishra, Saurabh [1 ]
Vincent, Durai Raj [1 ]
机构
[1] VIT Univ, Vellore, Tamil Nadu, India
关键词
RSA; Security; Encryption; Complexity; Public key; Private key;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In symmetric key cryptography the sender as well as the receiver possess a common key. Asymmetric key cryptography involves generation of two distinct keys which are used for encryption and decryption correspondingly. The sender converts the original message to cipher text using the public key while the receiver can decipher this using his private key. This is also called Public Key Cryptography. For every public key there can exist only one private key that can decipher the encrypted text. Security of RSA Algorithm can be compromised using mathematical attack, by guessing the factors of a large number. It may also be compromised if one can guess the private key. In accordance with the mathematical attack, we propose a secure algorithm in this paper. In this algorithm, we try to eliminate the distribution of n which is the large number whose factors if found compromises the RSA algorithm. We also present a comparative analysis of the proposed algorithm with the RSA algorithm.
引用
下载
收藏
页数:4
相关论文
共 50 条
  • [31] On the BRIP algorithms security for RSA
    Amiel, Frederic
    Feix, Benoit
    INFORMATION SECURITY THEORY AND PRACTICES: SMART DEVICES, CONVERGENCE AND NEXT GENERATION NETWORKS, 2008, 5019 : 136 - +
  • [32] The security of individual RSA bits
    Håstad, J
    Näslund, M
    39TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1998, : 510 - 519
  • [33] A new RSA algorithm of data security by large numbers and binary stream processing methods
    Information Center, Wuhan University, Wuhan, China
    不详
    J. Inf. Comput. Sci., 14 (5411-5418): : 5411 - 5418
  • [34] THE REAL RSA ALGORITHM
    KOCHANSKI, M
    BYTE, 1985, 10 (03): : 26 - 26
  • [35] Data security system using hybrid cryptosystem RC4A-RSA algorithm
    Rahmadani, R.
    Putri, T. T. A.
    Sriadhi, S.
    Sari, R. D.
    Hutahaean, H. D.
    INTERNATIONAL CONFERENCE ON INNOVATION IN ENGINEERING AND VOCATIONAL EDUCATION 2019 (ICIEVE 2019), PTS 1-4, 2020, 830
  • [36] ElGamal algorithm with hyperchaotic sequence to enhance security of cloud data
    Koppaka, Aruna Kumari
    Lakshmi, Vadlamani Naga
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2022,
  • [37] Applying Encryption Algorithm to Enhance Data Security in Cloud Storage
    Kartit, Zaid
    El Marraki, Mohamed
    ENGINEERING LETTERS, 2015, 23 (04) : 277 - 282
  • [38] Applying encryption algorithm to enhance data security in cloud storage
    Laboratory of Research in Informatics and Telecommunication , University of Mohammed V,Faculty of Science, Rabat, Morocco
    Eng. Lett., 4 (277-282):
  • [39] Strengthening Security of RSA-OAEP
    Boldyreva, Alexandra
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 399 - 413
  • [40] On the security of an RSA based encryption scheme
    Müller, S
    INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 135 - 148