An Algorithm to Enhance Security in RSA

被引:0
|
作者
Minni, Rohit [1 ]
Sultania, Kaushal [1 ]
Mishra, Saurabh [1 ]
Vincent, Durai Raj [1 ]
机构
[1] VIT Univ, Vellore, Tamil Nadu, India
来源
2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT) | 2013年
关键词
RSA; Security; Encryption; Complexity; Public key; Private key;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In symmetric key cryptography the sender as well as the receiver possess a common key. Asymmetric key cryptography involves generation of two distinct keys which are used for encryption and decryption correspondingly. The sender converts the original message to cipher text using the public key while the receiver can decipher this using his private key. This is also called Public Key Cryptography. For every public key there can exist only one private key that can decipher the encrypted text. Security of RSA Algorithm can be compromised using mathematical attack, by guessing the factors of a large number. It may also be compromised if one can guess the private key. In accordance with the mathematical attack, we propose a secure algorithm in this paper. In this algorithm, we try to eliminate the distribution of n which is the large number whose factors if found compromises the RSA algorithm. We also present a comparative analysis of the proposed algorithm with the RSA algorithm.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Data security in cloud using RSA
    Yellamma, Pachipala
    Narasimham, Challa
    sreenivas, Velagapudi
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [42] Security Analysis of RSA-BSSA
    Lysyanskaya, Anna
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2023, 13940 LNCS : 251 - 280
  • [43] Dual RSA and its security analysis
    Sun, Hung-Min
    Wu, Mu-En
    Ting, Wei-Chi
    Hinek, M. Jason
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (08) : 2922 - 2933
  • [44] Security Analysis of RSA-BSSA
    Lysyanskaya, Anna
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT I, 2023, 13940 : 251 - 280
  • [45] THE RSA-SECURITY-CONFERENCE 1995
    HEINLEIN, EB
    COMPUTERS & SECURITY, 1995, 14 (01) : 24 - 26
  • [46] On the Security of RSA-PSS in the Wild
    Kakvi, Saqib A.
    PROCEEDINGS OF THE 5TH ACM WORKSHOP ON SECURITY STANDARDISATION RESEARCH WORKSHOP (SSR '19), 2019, : 23 - 34
  • [47] SOME VARIATIONS ON RSA SIGNATURES AND THEIR SECURITY
    DEJONGE, W
    CHAUM, D
    LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 49 - 59
  • [48] Security Issues of Novel RSA Variant
    Nitaj, Abderrahmane
    Ariffin, Muhammad Rezal Bin Kamel
    Adenan, Nurul Nur Hanisah
    Lau, Terry Shue Chien
    Chen, Jiahui
    IEEE ACCESS, 2022, 10 : 53788 - 53796
  • [49] On the security of multi-prime RSA
    Hinek, M. Jason
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2008, 2 (02) : 117 - 147
  • [50] Weak forward security in mediated RSA
    Tsudik, G
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 45 - 54