SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Engineering Trends and Technology (IJETT) – Volume 37 Number 1- July 2016
ISSN: 2231-5381 http://www.ijettjournal.org Page 15
Factorization Hack of RSA Secret Numbers
Andysah Putera Utama Siahaan
Faculty of Computer Science
Universitas Pembangunan Panca Budi
Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia
Abstract - RSA always uses two big prime numbers to
deal with the encryption process. The public key is
obtained from the multiplication of both figures.
However, we can break it by doing factorization to
split the public key into two individual numbers.
Cryptanalysis can perform the public key crack by
knowing its value. The private key will be soon
constructed after the two numbers retrieved. The
public key is noted as β€œN”, while "N = P . Q". This
technique is unclassified anymore to solve the RSA
public and private key. If it is successfully factored
into p and q then ΙΈ (N) = (P -1). (Q -1) can be further
calculated. By having the public key e, the private key
d will be solved. Factorization method is the best way
to do the demolition. This study concerns to numbers
factorization. GCD calculation will produce the
encryption "E" and decryption "D" keys, but it
depends on the computer speed.
Keywords - Cryptography, RSA, Public Key,
Factorization
I. INTRODUCTION
There are various techniques should be used to
protect the confidential image data from unauthorized
accessand there are many to breach the security as
well[1]. RSA is a public key cryptographic algorithm
that works on two main cryptographic processes,
public and private key [6].The power of RSA is in the
prime numbers. The longer the key is used, the longer
the time used to factor the public key. The main
strength of the RSA algorithm is based on the
difficulty of factoring large numbers into prime factors
[3]. Although RSA is still difficult to solve, it has a
security hole by simply knowing the ciphertext and
public key. One of the techniques is to attack the RSA
public key by factoring the "N". This weakness is
utilized to carry out attacks to test the security level of
this algorithm.The most common attack on RSA is the
factorization problem of handling enormous number.
If there is a new rapid method has been developed, it
is possible to dismantle the RSA. In 2005, the largest
number factorization was commonly used throughout
the 663 bits, using advanced distribution methods.
RSA keys in general throughout 1024 through 2048
bits. Some experts believe that 1024-bit keys will be
solved shortly, but 2048-bit keys are still difficult to
solve in the future.Since RSA is breakable by
factoring the β€œN”, the security of RSA is often based
on the integer factorization problem [2].According to
mathematical theory, it is easy to get two big prime
numbers. However, the factorization is not easy as we
think [5]. We try to find the value of β€œP” and β€œQ”
form the known public key, but we limit the length of
the β€œN” value according to the computer clock speed.
II. BASIC CONCEPT
The symmetric key is one of the cryptographic
systems that uses the same kind of keys for encryption
and decryption while the asymmetric is where the
encryption and decryption use the different keys [4].
The RSA algorithm is described by three people from
MIT (Massachusetts Institute of Technology). There
are Ron Rivest, Adi Shamir, and Len Adleman in
1977. The encryption and description processes on
RSA come from the concept of prime numbers, and
modulo arithmetic. The encryption and decryption
keys are both integers. The encryption key is
unclassified while the decrypt key is confidential. The
decryption key is generated from several pieces of
prime numbers together with the encryption key. This
algorithm patented by MIT in 1983 in the United
States as US Patent 4405829. This patent is valid until
September 21st
, 2000.
RSA has several attributes indicate the input and
output parameters. There are seven aspects we have to
understand before trying to hack the RSA secret key
such as:
1. P and Q : private
2. N = P . Q : public
3. Ο†(N) = (P -1)(Q -1) : private
4. E (encryption key) : public
5. D (decryption key) : private
6. M (plaintext) : private
7. C (ciphertext) : public
There are two signs above, public and private.
Public means the value is unclassified. Everybody can
get the information. However, the private means it is
confidential. We must save it secretly. We hope
nobody will find those value. The β€œN” value is
obtained from the multiplication β€œP” and β€œQ”. Euler
function is a function that is used in mathematical
calculations on the RSA algorithm. Euler function is a
function that is used in mathematical calculations on
the RSA algorithm. Euler function defines Ο†(N) for
Nβ‰₯ 1 indicates the number of positive integers <N
International Journal of Engineering Trends and Technology (IJETT) – Volume 37 Number 1- July 2016
ISSN: 2231-5381 http://www.ijettjournal.org Page 16
relatively prime to N. Two numbers "A" and "B" are
relatively prime if GCD(A, B) = 1. The value of β€œE”
and β€œD” are used for both encryption and decryption
respectively. The β€œM” and β€œC” are the plaintext and
ciphertext byte arrays.
III. Evaluation
Implementation of RSA describes how the
algorithm performs the message concealment process
until the message is hidden. There are three most
important stages of manipulating the message in the
application of the RSA algorithm, such as the key
generation process, the process of concealment of
random messages (encryption) and the process of
restoring the random messages into the initial message
before manipulation (decryption). To hack the RSA
secret key, we can simulate from the first step, that is
the key generation process. After the generator
produces it, the computer will note the values written
on screen.
Table 1. Example of Key Generation
Variable Value
P 5011
Q 1093
N 5477023
Ο† 5470920
Table 1 illustrates the form of the key generation.
The computer produces the random numbers for both
β€œP” and β€œQ”. Then β€œN” and β€œΟ†β€ are calculated by the
earlier formula. The encryption and decryption keys
can be generated by both β€œN” and β€œΟ†β€. Then we carry
out the GCD between theβ€œΟ†β€and new incremented
variableβ€œE”. Not all the variable works. The test of
GCD(E, Ο†) = 1 must be done. The value which GCD
β‰ 1 cannot be accepted. We check theβ€œE”from 2 to
30 and the result is that we have five possibilities,
such as 11, 17, 19, 23, and 29. Sometimes, it is hard to
guess which value is used by the sender since there are
many probabilities of the prime numbers from 2 to Ο†.
In this example, we use Ο†=540920. There are many
prime numbers from 2 until 540920. However, it will
be discovered. It depends on the computer speed. In
this work, we assume that the value of the encryption
used is 11. Tabel 2 shows the selected values which
GCD is 1.
Table 2. The Encryption Key and GCD
E GCD
2 2
3 3
4 4
5 5
6 6
7 7
8 8
9 9
10 10
11 1
12 12
13 13
14 14
15 15
16 8
17 1
18 18
19 1
20 20
21 21
22 2
23 1
24 24
25 5
26 26
27 9
28 28
29 1
30 30
Soon after the encryption key is obtained, the
decryption key can be processed by doing the
following formula.
The first formula is to find the β€œD” (encryption
value). But not all the value retrieved can be used. The
second is Rest, β€œR” is a determinant whether the value
of β€œD” works. Looping is very important to search for
the β€œR” return zero value. Since R has more than zero,
β€œD” will not work as the decryption key.
Table 3. The decryption key
K D Rest
2 994712,82 9
3 1492069,2 2
4 1989425,5 6
5 2486781,9 10
6 2984138,3 3
7 3481494,6 7
8 3978851 0
9 4476207,4 4
10 4973563,7 8
11 5470920,1 1
12 5968276,5 5
(1)
(2)
International Journal of Engineering Trends and Technology (IJETT) – Volume 37 Number 1- July 2016
ISSN: 2231-5381 http://www.ijettjournal.org Page 17
13 6465632,8 9
14 6962989,2 2
15 7460345,5 6
16 7957701,9 10
17 8455058,3 3
18 8952414,6 7
19 9449771 0
20 9947127,4 4
21 10444484 8
22 10941840 1
23 11439196 5
24 11936553 9
25 12433909 2
26 12931266 6
27 13428622 10
28 13925978 3
29 14423335 7
30 14920691 0
Table 3 shows there are 29 sample of β€œK”, β€œD” and
β€œRest”. There are only three datas that states zero
value, such as data 8, 19 and 30. But, in this case, the
correct decryption key for the encryption key 11 as
discussed before is the first discovery, that is K = 8
and D = 3978851.In Table 4, all parameters can
directly implemented to plaintext and ciphertext.
Table 4. The complete parameters of RSA
Variable Value
P 5011
Q 1093
N 5477023
T 5470920
E 11
D 3978851
That was the complete story of RSA. In this
section, we try to break the N = 5477023. By
factorizing it, we will obtain the β€œP” and β€œQ”
simultenaously. First we calculate the SQRT(N) and
test the value is square root or not.
A = SQRT(N)
= SQRT(5477023)
= 2340.304 (must be rounded
down)
= 2340
Since A . A β‰  N, 5475600 β‰  5477023, we add A to 1.
The value of β€œA” will be 2341
A = A + 1
= 2340 + 1
= 2341
B = A . A – N
= 2341. 2341- 5477023
= 3258
C =
=
= 57
D = C . C
= 57 . 57
= 3249
R = B – D
= 3258 - 3249
= 9
The variable β€œR” is used to determined the two
prime numbers. β€œR” means Rest. The progress is
looped until the R=0 is achieved. Since β€œR” does not
produce zero, the β€œA” and β€œB” are malfunctioned. In
Table 5 below, the complete progress of these five
parameters cycle.
Table 5. The cycle of β€œA”, β€œB”, ”C”, β€œD” and β€œR”
(part 1)
Cycle A B C D R
1 2341 3258 57 3249 9
2 2342 7941 89 7921 20
3 2343 12626 112 12544 82
4 2344 17313 131 17161 152
5 2345 22002 148 21904 98
6 2346 26693 163 26569 124
7 2347 31386 177 31329 57
8 2348 36081 189 35721 360
9 2349 40778 201 40401 377
10 2350 45477 213 45369 108
11 2351 50178 224 50176 2
12 2352 54881 234 54756 125
13 2353 59586 244 59536 50
14 2354 64293 253 64009 284
15 2355 69002 262 68644 358
16 2356 73713 271 73441 272
17 2357 78426 280 78400 26
18 2358 83141 288 82944 197
19 2359 87858 296 87616 242
20 2360 92577 304 92416 161
21 2361 97298 311 96721 577
22 2362 102021 319 101761 260
23 2363 106746 326 106276 470
24 2364 111473 333 110889 584
25 2365 116202 340 115600 602
26 2366 120933 347 120409 524
27 2367 125666 354 125316 350
28 2368 130401 361 130321 80
29 2369 135138 367 134689 449
30 2370 139877 374 139876 1
International Journal of Engineering Trends and Technology (IJETT) – Volume 37 Number 1- July 2016
ISSN: 2231-5381 http://www.ijettjournal.org Page 18
Let’s focus on the β€œR” value. We have done the
calculation for 30 times. However, the β€œR” still return
the wrong value. The progress must be looped until it
shows zero.
Table 6. The cycle of β€œA”, β€œB”, ”C”, β€œD” and β€œR”
(part 2)
Cycle A B C D R
683 3023 3661506 1913 3659569 1937
684 3024 3667553 1915 3667225 328
685 3025 3673602 1916 3671056 2546
686 3026 3679653 1918 3678724 929
687 3027 3685706 1919 3682561 3145
688 3028 3691761 1921 3690241 1520
689 3029 3697818 1922 3694084 3734
690 3030 3703877 1924 3701776 2101
691 3031 3709938 1926 3709476 462
692 3032 3716001 1927 3713329 2672
693 3033 3722066 1929 3721041 1025
694 3034 3728133 1930 3724900 3233
695 3035 3734202 1932 3732624 1578
696 3036 3740273 1933 3736489 3784
697 3037 3746346 1935 3744225 2121
698 3038 3752421 1937 3751969 452
699 3039 3758498 1938 3755844 2654
700 3040 3764577 1940 3763600 977
701 3041 3770658 1941 3767481 3177
702 3042 3776741 1943 3775249 1492
703 3043 3782826 1944 3779136 3690
704 3044 3788913 1946 3786916 1997
705 3045 3795002 1948 3794704 298
706 3046 3801093 1949 3798601 2492
707 3047 3807186 1951 3806401 785
708 3048 3813281 1952 3810304 2977
709 3049 3819378 1954 3818116 1262
710 3050 3825477 1955 3822025 3452
711 3051 3831578 1957 3829849 1729
712 3052 3837681 1959 3837681 0
The calculation continues until reach the desired
value. Table 6 is the last cycle before reaching the
zero value. After cycle 712 the β€œR” value gave the
right value. R = 0 is what the factorization needs. The
β€œP” and β€œQ” can be obtained then.
P =
=
=
=
Q =
=
=
=
Now we see the P = 1093 and Q = 5011, and the
values before factorization are P = 5011 and Q = 1039.
It does not matter because the β€œP” and β€œQ” are
swappable.After we get those values, the process of
finding β€œE” and β€œD” can be continued as discussed
before.
IV. CONCLUSION
There are many algorithms for symmetric and
asymmetric can be used for encryption, decryption,
key exchange and digital signature. To resolve the
prime factors of RSA, we can use integer factorization
algorithm. The RSA breach can be resolved easily by
doing factorization on the public key. Everyone has
already known the issue, and it is not a secret thing
anymore. The speed depends on the public key length.
The value of "P" and "Q" are not confidential since we
use the small integer number. To protect them, we
should use the big integer. There is no limitation for
the integer. We can increase as long as the computer
can calculate the formula properly.
REFERENCES
[1] A. P. U. Siahaan, β€œRC4 Technique in Visual Cryptography,”
SNATIA, Semarang, 2016.
[2] B. R. Ambedkar dan S. S. Bedi, β€œA New Factorization Method
to Factorize RSA Public Key Encryption,” International
Journal of Computer Science, vol. 8, no. 6, pp. 242-247, 2011.
[3] H.-M. Sun, M.-E. Wu, W.-C. Ting dan M. J. Hinek, β€œDual RSA
and Its Security Analysis,” IEEE Transactions on Information
Theory, vol. 53, no. 8, 2007.
[4] A. P. U. Siahaan, β€œThree-Pass Protocol Concept in Hill Cipher
Encryption Technique,” SNATI, Yogyakarta, 2016.
[5] N. Hegde dan P. Deepthi, β€œPollard RHO Algorithm for Integer
Factorization and Discrete Logarithm Problem,” International
Journal of Computer Applications, vol. 121, no. 18, pp. 14-17,
2012.
[6] F. Nizar, F. Latheef dan A. Jamal, β€œRSA Based Encrypted Data
Embedding Using APPM,” International Journal of
Engineering Trends and Technology, vol. 9, no. 15, pp. 777-
782, 2014.

More Related Content

What's hot

RSA algorithm
RSA algorithmRSA algorithm
RSA algorithmArpana shree
Β 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)ArthyR3
Β 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
Β 
Analysis of Shared RSA Modulus
Analysis of Shared RSA ModulusAnalysis of Shared RSA Modulus
Analysis of Shared RSA ModulusDharmalingam Ganesan
Β 
Cryptography Workbook
Cryptography WorkbookCryptography Workbook
Cryptography WorkbookArthyR3
Β 
RSA Algorithm report
RSA Algorithm reportRSA Algorithm report
RSA Algorithm reportMohamed Ramadan
Β 
Backtracking based integer factorisation, primality testing and square root c...
Backtracking based integer factorisation, primality testing and square root c...Backtracking based integer factorisation, primality testing and square root c...
Backtracking based integer factorisation, primality testing and square root c...csandit
Β 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa CrptosystemAmlan Patel
Β 
An Analysis of RSA Public Exponent e
An Analysis of RSA Public Exponent eAn Analysis of RSA Public Exponent e
An Analysis of RSA Public Exponent eDharmalingam Ganesan
Β 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET Journal
Β 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSAPratik Poddar
Β 
Cs6701 cryptography and network security
Cs6701 cryptography and network securityCs6701 cryptography and network security
Cs6701 cryptography and network securityArthyR3
Β 
Tiny encryption algorithm
Tiny encryption algorithmTiny encryption algorithm
Tiny encryption algorithmFarah M. Altufaili
Β 
IJEIR_1615
IJEIR_1615IJEIR_1615
IJEIR_1615Gaurav pal
Β 
A Study of RSA Algorithm in Cryptography
A Study of RSA Algorithm in CryptographyA Study of RSA Algorithm in Cryptography
A Study of RSA Algorithm in Cryptographyijtsrd
Β 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystemSamdish Arora
Β 

What's hot (20)

RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
Β 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)
Β 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Β 
Analysis of Shared RSA Modulus
Analysis of Shared RSA ModulusAnalysis of Shared RSA Modulus
Analysis of Shared RSA Modulus
Β 
Cryptography Workbook
Cryptography WorkbookCryptography Workbook
Cryptography Workbook
Β 
RSA Algorithm report
RSA Algorithm reportRSA Algorithm report
RSA Algorithm report
Β 
Backtracking based integer factorisation, primality testing and square root c...
Backtracking based integer factorisation, primality testing and square root c...Backtracking based integer factorisation, primality testing and square root c...
Backtracking based integer factorisation, primality testing and square root c...
Β 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
Β 
An Analysis of RSA Public Exponent e
An Analysis of RSA Public Exponent eAn Analysis of RSA Public Exponent e
An Analysis of RSA Public Exponent e
Β 
Ntewrok secuirty cs7
Ntewrok secuirty cs7Ntewrok secuirty cs7
Ntewrok secuirty cs7
Β 
RSA
RSARSA
RSA
Β 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
Β 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
Β 
The rsa algorithm JooSeok Song
The rsa algorithm JooSeok SongThe rsa algorithm JooSeok Song
The rsa algorithm JooSeok Song
Β 
Cs6701 cryptography and network security
Cs6701 cryptography and network securityCs6701 cryptography and network security
Cs6701 cryptography and network security
Β 
Tiny encryption algorithm
Tiny encryption algorithmTiny encryption algorithm
Tiny encryption algorithm
Β 
IJEIR_1615
IJEIR_1615IJEIR_1615
IJEIR_1615
Β 
A Study of RSA Algorithm in Cryptography
A Study of RSA Algorithm in CryptographyA Study of RSA Algorithm in Cryptography
A Study of RSA Algorithm in Cryptography
Β 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
Β 
Analysis of a Modified RC4
Analysis of a Modified RC4 Analysis of a Modified RC4
Analysis of a Modified RC4
Β 

Similar to Factorization Hack of RSA Secret Numbers

Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Editor IJARCET
Β 
Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Editor IJARCET
Β 
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...CSCJournals
Β 
Performance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmPerformance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmeSAT Journals
Β 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys IJECEIAES
Β 
An implementation of RSA policy
An implementation of RSA policyAn implementation of RSA policy
An implementation of RSA policySM NAZMUS SALEHIN
Β 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemIAEME Publication
Β 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsaMohsin Ali
Β 
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptxRivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptxwerip98386
Β 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
Β 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuIJNSA Journal
Β 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGIJNSA Journal
Β 
Research on RSA
Research on RSAResearch on RSA
Research on RSAfaizmajeed
Β 
RSA Algm.pptx
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptxSou Jana
Β 
Security_Attacks_On_RSA~ A Computational Number Theoretic Approach.pptx
Security_Attacks_On_RSA~ A Computational Number Theoretic Approach.pptxSecurity_Attacks_On_RSA~ A Computational Number Theoretic Approach.pptx
Security_Attacks_On_RSA~ A Computational Number Theoretic Approach.pptxshahiduljahid71
Β 
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...Associate Professor in VSB Coimbatore
Β 
Security of RSA and Integer Factorization
Security of RSA and Integer FactorizationSecurity of RSA and Integer Factorization
Security of RSA and Integer FactorizationDharmalingam Ganesan
Β 

Similar to Factorization Hack of RSA Secret Numbers (20)

Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327
Β 
Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327
Β 
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Β 
Performance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmPerformance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithm
Β 
The RSA Algorithm Explored
The RSA Algorithm ExploredThe RSA Algorithm Explored
The RSA Algorithm Explored
Β 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Β 
F010243136
F010243136F010243136
F010243136
Β 
An implementation of RSA policy
An implementation of RSA policyAn implementation of RSA policy
An implementation of RSA policy
Β 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystem
Β 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
Β 
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptxRivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Β 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Β 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
Β 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
Β 
Research on RSA
Research on RSAResearch on RSA
Research on RSA
Β 
Ijetcas14 336
Ijetcas14 336Ijetcas14 336
Ijetcas14 336
Β 
RSA Algm.pptx
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptx
Β 
Security_Attacks_On_RSA~ A Computational Number Theoretic Approach.pptx
Security_Attacks_On_RSA~ A Computational Number Theoretic Approach.pptxSecurity_Attacks_On_RSA~ A Computational Number Theoretic Approach.pptx
Security_Attacks_On_RSA~ A Computational Number Theoretic Approach.pptx
Β 
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
Β 
Security of RSA and Integer Factorization
Security of RSA and Integer FactorizationSecurity of RSA and Integer Factorization
Security of RSA and Integer Factorization
Β 

More from Universitas Pembangunan Panca Budi

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Universitas Pembangunan Panca Budi
Β 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa Universitas Pembangunan Panca Budi
Β 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Universitas Pembangunan Panca Budi
Β 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityUniversitas Pembangunan Panca Budi
Β 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphUniversitas Pembangunan Panca Budi
Β 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionUniversitas Pembangunan Panca Budi
Β 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmUniversitas Pembangunan Panca Budi
Β 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmUniversitas Pembangunan Panca Budi
Β 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Universitas Pembangunan Panca Budi
Β 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishUniversitas Pembangunan Panca Budi
Β 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...Universitas Pembangunan Panca Budi
Β 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Universitas Pembangunan Panca Budi
Β 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
Β 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Universitas Pembangunan Panca Budi
Β 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningUniversitas Pembangunan Panca Budi
Β 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
Β 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodUniversitas Pembangunan Panca Budi
Β 

More from Universitas Pembangunan Panca Budi (20)

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Β 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
Β 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Β 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Β 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
Β 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Β 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Β 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
Β 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Β 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Β 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
Β 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
Β 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Β 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Β 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Β 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Β 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
Β 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
Β 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
Β 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Β 

Recently uploaded

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
Β 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
Β 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
Β 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
Β 
18-04-UA_REPORT_MEDIALITERAΠ‘Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAΠ‘Y_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAΠ‘Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAΠ‘Y_INDEX-DM_23-1-final-eng.pdfssuser54595a
Β 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
Β 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
Β 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
Β 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)Dr. Mazin Mohamed alkathiri
Β 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
Β 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
Β 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
Β 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
Β 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
Β 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
Β 
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈcall girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ9953056974 Low Rate Call Girls In Saket, Delhi NCR
Β 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
Β 

Recently uploaded (20)

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
Β 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Β 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Β 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
Β 
18-04-UA_REPORT_MEDIALITERAΠ‘Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAΠ‘Y_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAΠ‘Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAΠ‘Y_INDEX-DM_23-1-final-eng.pdf
Β 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
Β 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
Β 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
Β 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
Β 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
Β 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Β 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
Β 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Β 
Model Call Girl in Bikash Puri Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Bikash Puri  Delhi reach out to us at πŸ”9953056974πŸ”Model Call Girl in Bikash Puri  Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Bikash Puri Delhi reach out to us at πŸ”9953056974πŸ”
Β 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
Β 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
Β 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
Β 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
Β 
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈcall girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
Β 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
Β 

Factorization Hack of RSA Secret Numbers

  • 1. International Journal of Engineering Trends and Technology (IJETT) – Volume 37 Number 1- July 2016 ISSN: 2231-5381 http://www.ijettjournal.org Page 15 Factorization Hack of RSA Secret Numbers Andysah Putera Utama Siahaan Faculty of Computer Science Universitas Pembangunan Panca Budi Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia Abstract - RSA always uses two big prime numbers to deal with the encryption process. The public key is obtained from the multiplication of both figures. However, we can break it by doing factorization to split the public key into two individual numbers. Cryptanalysis can perform the public key crack by knowing its value. The private key will be soon constructed after the two numbers retrieved. The public key is noted as β€œN”, while "N = P . Q". This technique is unclassified anymore to solve the RSA public and private key. If it is successfully factored into p and q then ΙΈ (N) = (P -1). (Q -1) can be further calculated. By having the public key e, the private key d will be solved. Factorization method is the best way to do the demolition. This study concerns to numbers factorization. GCD calculation will produce the encryption "E" and decryption "D" keys, but it depends on the computer speed. Keywords - Cryptography, RSA, Public Key, Factorization I. INTRODUCTION There are various techniques should be used to protect the confidential image data from unauthorized accessand there are many to breach the security as well[1]. RSA is a public key cryptographic algorithm that works on two main cryptographic processes, public and private key [6].The power of RSA is in the prime numbers. The longer the key is used, the longer the time used to factor the public key. The main strength of the RSA algorithm is based on the difficulty of factoring large numbers into prime factors [3]. Although RSA is still difficult to solve, it has a security hole by simply knowing the ciphertext and public key. One of the techniques is to attack the RSA public key by factoring the "N". This weakness is utilized to carry out attacks to test the security level of this algorithm.The most common attack on RSA is the factorization problem of handling enormous number. If there is a new rapid method has been developed, it is possible to dismantle the RSA. In 2005, the largest number factorization was commonly used throughout the 663 bits, using advanced distribution methods. RSA keys in general throughout 1024 through 2048 bits. Some experts believe that 1024-bit keys will be solved shortly, but 2048-bit keys are still difficult to solve in the future.Since RSA is breakable by factoring the β€œN”, the security of RSA is often based on the integer factorization problem [2].According to mathematical theory, it is easy to get two big prime numbers. However, the factorization is not easy as we think [5]. We try to find the value of β€œP” and β€œQ” form the known public key, but we limit the length of the β€œN” value according to the computer clock speed. II. BASIC CONCEPT The symmetric key is one of the cryptographic systems that uses the same kind of keys for encryption and decryption while the asymmetric is where the encryption and decryption use the different keys [4]. The RSA algorithm is described by three people from MIT (Massachusetts Institute of Technology). There are Ron Rivest, Adi Shamir, and Len Adleman in 1977. The encryption and description processes on RSA come from the concept of prime numbers, and modulo arithmetic. The encryption and decryption keys are both integers. The encryption key is unclassified while the decrypt key is confidential. The decryption key is generated from several pieces of prime numbers together with the encryption key. This algorithm patented by MIT in 1983 in the United States as US Patent 4405829. This patent is valid until September 21st , 2000. RSA has several attributes indicate the input and output parameters. There are seven aspects we have to understand before trying to hack the RSA secret key such as: 1. P and Q : private 2. N = P . Q : public 3. Ο†(N) = (P -1)(Q -1) : private 4. E (encryption key) : public 5. D (decryption key) : private 6. M (plaintext) : private 7. C (ciphertext) : public There are two signs above, public and private. Public means the value is unclassified. Everybody can get the information. However, the private means it is confidential. We must save it secretly. We hope nobody will find those value. The β€œN” value is obtained from the multiplication β€œP” and β€œQ”. Euler function is a function that is used in mathematical calculations on the RSA algorithm. Euler function is a function that is used in mathematical calculations on the RSA algorithm. Euler function defines Ο†(N) for Nβ‰₯ 1 indicates the number of positive integers <N
  • 2. International Journal of Engineering Trends and Technology (IJETT) – Volume 37 Number 1- July 2016 ISSN: 2231-5381 http://www.ijettjournal.org Page 16 relatively prime to N. Two numbers "A" and "B" are relatively prime if GCD(A, B) = 1. The value of β€œE” and β€œD” are used for both encryption and decryption respectively. The β€œM” and β€œC” are the plaintext and ciphertext byte arrays. III. Evaluation Implementation of RSA describes how the algorithm performs the message concealment process until the message is hidden. There are three most important stages of manipulating the message in the application of the RSA algorithm, such as the key generation process, the process of concealment of random messages (encryption) and the process of restoring the random messages into the initial message before manipulation (decryption). To hack the RSA secret key, we can simulate from the first step, that is the key generation process. After the generator produces it, the computer will note the values written on screen. Table 1. Example of Key Generation Variable Value P 5011 Q 1093 N 5477023 Ο† 5470920 Table 1 illustrates the form of the key generation. The computer produces the random numbers for both β€œP” and β€œQ”. Then β€œN” and β€œΟ†β€ are calculated by the earlier formula. The encryption and decryption keys can be generated by both β€œN” and β€œΟ†β€. Then we carry out the GCD between theβ€œΟ†β€and new incremented variableβ€œE”. Not all the variable works. The test of GCD(E, Ο†) = 1 must be done. The value which GCD β‰ 1 cannot be accepted. We check theβ€œE”from 2 to 30 and the result is that we have five possibilities, such as 11, 17, 19, 23, and 29. Sometimes, it is hard to guess which value is used by the sender since there are many probabilities of the prime numbers from 2 to Ο†. In this example, we use Ο†=540920. There are many prime numbers from 2 until 540920. However, it will be discovered. It depends on the computer speed. In this work, we assume that the value of the encryption used is 11. Tabel 2 shows the selected values which GCD is 1. Table 2. The Encryption Key and GCD E GCD 2 2 3 3 4 4 5 5 6 6 7 7 8 8 9 9 10 10 11 1 12 12 13 13 14 14 15 15 16 8 17 1 18 18 19 1 20 20 21 21 22 2 23 1 24 24 25 5 26 26 27 9 28 28 29 1 30 30 Soon after the encryption key is obtained, the decryption key can be processed by doing the following formula. The first formula is to find the β€œD” (encryption value). But not all the value retrieved can be used. The second is Rest, β€œR” is a determinant whether the value of β€œD” works. Looping is very important to search for the β€œR” return zero value. Since R has more than zero, β€œD” will not work as the decryption key. Table 3. The decryption key K D Rest 2 994712,82 9 3 1492069,2 2 4 1989425,5 6 5 2486781,9 10 6 2984138,3 3 7 3481494,6 7 8 3978851 0 9 4476207,4 4 10 4973563,7 8 11 5470920,1 1 12 5968276,5 5 (1) (2)
  • 3. International Journal of Engineering Trends and Technology (IJETT) – Volume 37 Number 1- July 2016 ISSN: 2231-5381 http://www.ijettjournal.org Page 17 13 6465632,8 9 14 6962989,2 2 15 7460345,5 6 16 7957701,9 10 17 8455058,3 3 18 8952414,6 7 19 9449771 0 20 9947127,4 4 21 10444484 8 22 10941840 1 23 11439196 5 24 11936553 9 25 12433909 2 26 12931266 6 27 13428622 10 28 13925978 3 29 14423335 7 30 14920691 0 Table 3 shows there are 29 sample of β€œK”, β€œD” and β€œRest”. There are only three datas that states zero value, such as data 8, 19 and 30. But, in this case, the correct decryption key for the encryption key 11 as discussed before is the first discovery, that is K = 8 and D = 3978851.In Table 4, all parameters can directly implemented to plaintext and ciphertext. Table 4. The complete parameters of RSA Variable Value P 5011 Q 1093 N 5477023 T 5470920 E 11 D 3978851 That was the complete story of RSA. In this section, we try to break the N = 5477023. By factorizing it, we will obtain the β€œP” and β€œQ” simultenaously. First we calculate the SQRT(N) and test the value is square root or not. A = SQRT(N) = SQRT(5477023) = 2340.304 (must be rounded down) = 2340 Since A . A β‰  N, 5475600 β‰  5477023, we add A to 1. The value of β€œA” will be 2341 A = A + 1 = 2340 + 1 = 2341 B = A . A – N = 2341. 2341- 5477023 = 3258 C = = = 57 D = C . C = 57 . 57 = 3249 R = B – D = 3258 - 3249 = 9 The variable β€œR” is used to determined the two prime numbers. β€œR” means Rest. The progress is looped until the R=0 is achieved. Since β€œR” does not produce zero, the β€œA” and β€œB” are malfunctioned. In Table 5 below, the complete progress of these five parameters cycle. Table 5. The cycle of β€œA”, β€œB”, ”C”, β€œD” and β€œR” (part 1) Cycle A B C D R 1 2341 3258 57 3249 9 2 2342 7941 89 7921 20 3 2343 12626 112 12544 82 4 2344 17313 131 17161 152 5 2345 22002 148 21904 98 6 2346 26693 163 26569 124 7 2347 31386 177 31329 57 8 2348 36081 189 35721 360 9 2349 40778 201 40401 377 10 2350 45477 213 45369 108 11 2351 50178 224 50176 2 12 2352 54881 234 54756 125 13 2353 59586 244 59536 50 14 2354 64293 253 64009 284 15 2355 69002 262 68644 358 16 2356 73713 271 73441 272 17 2357 78426 280 78400 26 18 2358 83141 288 82944 197 19 2359 87858 296 87616 242 20 2360 92577 304 92416 161 21 2361 97298 311 96721 577 22 2362 102021 319 101761 260 23 2363 106746 326 106276 470 24 2364 111473 333 110889 584 25 2365 116202 340 115600 602 26 2366 120933 347 120409 524 27 2367 125666 354 125316 350 28 2368 130401 361 130321 80 29 2369 135138 367 134689 449 30 2370 139877 374 139876 1
  • 4. International Journal of Engineering Trends and Technology (IJETT) – Volume 37 Number 1- July 2016 ISSN: 2231-5381 http://www.ijettjournal.org Page 18 Let’s focus on the β€œR” value. We have done the calculation for 30 times. However, the β€œR” still return the wrong value. The progress must be looped until it shows zero. Table 6. The cycle of β€œA”, β€œB”, ”C”, β€œD” and β€œR” (part 2) Cycle A B C D R 683 3023 3661506 1913 3659569 1937 684 3024 3667553 1915 3667225 328 685 3025 3673602 1916 3671056 2546 686 3026 3679653 1918 3678724 929 687 3027 3685706 1919 3682561 3145 688 3028 3691761 1921 3690241 1520 689 3029 3697818 1922 3694084 3734 690 3030 3703877 1924 3701776 2101 691 3031 3709938 1926 3709476 462 692 3032 3716001 1927 3713329 2672 693 3033 3722066 1929 3721041 1025 694 3034 3728133 1930 3724900 3233 695 3035 3734202 1932 3732624 1578 696 3036 3740273 1933 3736489 3784 697 3037 3746346 1935 3744225 2121 698 3038 3752421 1937 3751969 452 699 3039 3758498 1938 3755844 2654 700 3040 3764577 1940 3763600 977 701 3041 3770658 1941 3767481 3177 702 3042 3776741 1943 3775249 1492 703 3043 3782826 1944 3779136 3690 704 3044 3788913 1946 3786916 1997 705 3045 3795002 1948 3794704 298 706 3046 3801093 1949 3798601 2492 707 3047 3807186 1951 3806401 785 708 3048 3813281 1952 3810304 2977 709 3049 3819378 1954 3818116 1262 710 3050 3825477 1955 3822025 3452 711 3051 3831578 1957 3829849 1729 712 3052 3837681 1959 3837681 0 The calculation continues until reach the desired value. Table 6 is the last cycle before reaching the zero value. After cycle 712 the β€œR” value gave the right value. R = 0 is what the factorization needs. The β€œP” and β€œQ” can be obtained then. P = = = = Q = = = = Now we see the P = 1093 and Q = 5011, and the values before factorization are P = 5011 and Q = 1039. It does not matter because the β€œP” and β€œQ” are swappable.After we get those values, the process of finding β€œE” and β€œD” can be continued as discussed before. IV. CONCLUSION There are many algorithms for symmetric and asymmetric can be used for encryption, decryption, key exchange and digital signature. To resolve the prime factors of RSA, we can use integer factorization algorithm. The RSA breach can be resolved easily by doing factorization on the public key. Everyone has already known the issue, and it is not a secret thing anymore. The speed depends on the public key length. The value of "P" and "Q" are not confidential since we use the small integer number. To protect them, we should use the big integer. There is no limitation for the integer. We can increase as long as the computer can calculate the formula properly. REFERENCES [1] A. P. U. Siahaan, β€œRC4 Technique in Visual Cryptography,” SNATIA, Semarang, 2016. [2] B. R. Ambedkar dan S. S. Bedi, β€œA New Factorization Method to Factorize RSA Public Key Encryption,” International Journal of Computer Science, vol. 8, no. 6, pp. 242-247, 2011. [3] H.-M. Sun, M.-E. Wu, W.-C. Ting dan M. J. Hinek, β€œDual RSA and Its Security Analysis,” IEEE Transactions on Information Theory, vol. 53, no. 8, 2007. [4] A. P. U. Siahaan, β€œThree-Pass Protocol Concept in Hill Cipher Encryption Technique,” SNATI, Yogyakarta, 2016. [5] N. Hegde dan P. Deepthi, β€œPollard RHO Algorithm for Integer Factorization and Discrete Logarithm Problem,” International Journal of Computer Applications, vol. 121, no. 18, pp. 14-17, 2012. [6] F. Nizar, F. Latheef dan A. Jamal, β€œRSA Based Encrypted Data Embedding Using APPM,” International Journal of Engineering Trends and Technology, vol. 9, no. 15, pp. 777- 782, 2014.