by admin
Enhanced And Secured Rsa Key Generation Scheme Esrkgs
Enhanced And Secured Rsa Key Generation Scheme Esrkgs 9,9/10 4652 reviews
- To enhance the security of clients information, in this paper, (IKGSR) an improved key generation scheme for RSA algorithm is introduced which employs four giant prime numbers to create encoding (E) and decoding (D) keys. A database schema is also designed to save the key elements of RSA before it initiates.
- An Enhanced and Secure RSA Key Generation Scheme (ESRKGS) was proposed by Karatas et al. They used an alternate private key to break a security system. They used an alternate private key.
- In the proposed Enhanced and Secured RSA Key Generation Scheme (ESRKGS), the public component n is the product of two large prime numbers but the values of Encryption (E) and Decryption (D) keys are based on the product of four large prime numbers (N) making the system highly secured.
- Increase of key size increases the security of the system. In this paper, an Enhanced RSA Key Generation Scheme (ESRKGS) is proposed to reduce the direct attacks possible in the case of RSA. The scheme is based on four large prime numbers instead of two. Also, the keys are not directly dependent on the public key n. Therefore any kind of brute.
- The proposed Modified RSA (MRSA) scheme focuses on mitigating the major issues of RSA system. Most cases the major issue is, it is breakable because of easily computation of keys based on “N”. And Nithya, K. (2015) An Enhanced and Secured RSA Key Generation Scheme (ESRKGS). Journal of Information Security and Applications.
/gmod-steam-key-generator-2016.html. https://Early-2009-Mac-Os-Thumb-Drive.peatix.com/. Introduction Thangavel et al. (2015) introduced a new public key cryptosystem which is called the Enhanced and Secured RSA Key Generation Scheme (ESRKGS). As we can see from its name, the authors proposed to improve the famous traditional RSA cryptosystem developed by Rivest et al. Openssl generate private public key pair. (1978) given below.
Rsa Key Generation Example
- Mell, P.M., Grance, T.: SP 800-145, the NIST definition of cloud computing. Technical report, NIST, Gaithersburg, MD, United States (2011)Google Scholar
- Buchade, A.R., Ingle, R.: Key management for cloud data storage: methods and comparisons. In: Fourth International Conference on Advanced Computing and Communications Technologies, pp. 263–270 (2014)Google Scholar
- Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. (2015). https://doi.org/10.1016/j.ins.2015.01.025
- Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn, p. 121e44, 253e97. Pearson Education (2011)Google Scholar
- Jamgekar, R.S., Joshi, G.S.: File encryption and decryption using secure RSA. Int. J. Emerg. Sci. Eng. 1, 11–14 (2013)Google Scholar
- Somani, N., Mangal, D.: An improved RSA cryptographic system. Int. J. Comput. Appl. 105, 16 (2014)Google Scholar
- Patidar, R., Bhartiya, R.: Modified RSA cryptosystem based on offline storage and prime number. In: IEEE International Conference on Computing Intelligence and Computing Research, pp. 1–6 (2013)Google Scholar
- Abd, S.K., Al-Haddad, S.A.R., Hashim, F., Abdullah, A.: A review of cloud security based on cryptographic mechanisms. In: International Symposium on Biometrices and Security Technologies (ISBAST), pp. 106–111 (2014)Google Scholar
- Song, N., Chen, Y.: Novel hyper-combined public key based cloud storage key management scheme. China Commun. 11, 185–194 (2014)Google Scholar
- Thangavel, M., Varalakshmi, P., Murrali, M., Nithya, K.: An enhanced and secured RSA key generation scheme (ESRKGS). J. Inf. Secur. Appl. 20, 3–10 (2015)Google Scholar
- Luy, E., Karatas, Z.Y., Ergin, H.: Comment on an enhanced and secured RSA key generation scheme (ESRKGS). J. Inf. Secur. Appl. (2016)Google Scholar
- Wagner, N.R.: The laws of cryptography with java code. Technical report, pp. 78–112 (2003)Google Scholar
- Bishop, D.: Introduction to cryptography with java applets, pp. 237–250 (2003)Google Scholar
Enhanced And Secured Rsa Key Generation Scheme Esrkgs 1
- Thangavel, M., et al.: An Enhanced and Secured RSA Key Generation Scheme (ESRKGS). J. Inf. Secur. Appl. 20, 3–10 (2015)Google Scholar
- Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRefGoogle Scholar
- Blömer, J., May, A.: A generalized wiener attack on RSA. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 1–13. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24632-9_1CrossRefGoogle Scholar
- Wiener, M.: Cryptanalysis of short RSA secret exponents. IEEE Trans. Inf. Theory 36(3), 553–558 (1990)MathSciNetCrossRefGoogle Scholar
- Al-Hamami, A.H., Aldariseh, I.A.: Enhanced method for RSA cryptosystem algorithm. In: International Conference on Advanced Computer Science Applications and Technologies, Kuala Lumpur, pp. 402–408 (2012)Google Scholar
- Ali, H., Al-Salami, M.: Timing attack prospect for RSA cryptanalysis using genetic algorithm technique. Int. Arab J. Inf. Technol. 1(1), 80–85 (2004)Google Scholar
- Ivy, P.U., Mandiwa, P., Kumar, M.: A modified RSA cryptosystem based on ‘n’ prime numbers. Int. J. Eng. Comput. Sci. 1(2), 63–66 (2012)Google Scholar
- Jamgekar, R.S., Joshi, G.S.: File encryption and decryption using secure RSA. Int. J. Emerg. Sci. Eng. (IJESE) 1(4), 11–14 (2013)Google Scholar
- Chhabra, A., Mathur, S.: Modified RSA algorithm: a secure approach. In: International Conference on Computational Intelligence and Communication Networks, Gwalior, pp. 545–548 (2011)Google Scholar
- Mahajan, S., Easo, S.: Performance evolution of RSA and new cryptosystem. Int. J. Emerg. Technol. Adv. Eng. 2(3), 279–283 (2012)Google Scholar
- Minni, R., Sultania, K., Mishra, S., Vincent, D.R.: An algorithm to enhance security in RSA. In: Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, pp. 1–4 (2013)Google Scholar
- Segar, T.C., Vijayaragavan, R.: Pell’s RSA key generation and its security analysis. In: Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, pp. 1–5 (2013)Google Scholar
- Sharma, S., Sharma, P., Dhakar, R.S.: RSA algorithm using modified subset sum cryptosystem. In: International Conference on Computer & Communication Technology (ICCCT), Allahabad, pp. 457–61 (2011)Google Scholar
- Wu, C.H., Hong, J.H., Wu, C.W.: RSA cryptosystem design based on the Chinese remainder theorem. In: Design Automation Conference, Proceedings of the ASP-DAC, Yokohama, pp. 391–395 (2001)Google Scholar
- Schneier, B.: Applied Cryptography, 2nd edn. Wiley, New Delhi (2012)zbMATHGoogle Scholar
- Kahate, A.: Cryptography and Network Security, 2nd edn. Tata McGraw-Hill, New Delhi (2005)Google Scholar
- Stallings, W.: Cryptography and Network Security, 4th edn. Pentice-Hall of India, New Delhi (2007)Google Scholar
- Whitman, M.E., Mattord, H.J.: Principles of Information Security, 5th edn. Cengage Learning, Boston (2015)Google Scholar
- Pachghare, V.K.: Cryptography and Information Security, 2nd edn. PHI Learning Private Limited, Delhi (2015)Google Scholar
- Forouzan, B.A., Mukhopadhyay, D.: Cryptography and Network Security, 2nd edn. Tata McGraw Hill Education Private Limited, New Delhi (2016)Google Scholar