SlideShare a Scribd company logo
1 of 2
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 08, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 247
A Literature Review of Some Modern RSA Variants
Akansha Tuteja1
Amit Shrivastava2
1,2
Department of Computer Science & Engineering
1,2
RGPV University, SVCE Indore, India
Abstract— RSA cryptosystem is the most commonly used
public key cryptosystem. It is the first public key
cryptosystem. The strength of this cryptosystem is based on
the larger key size. There are many algorithms and variants of
RSA. But, it is steal a burning topic of research. Because the
thrust to store data secret is never going to end. In this paper,
we have proposed a literature review of some modern variants
of the RSA algorithm. All the algorithms have been analyzed.
Their merits and demerits are also discussed.
Keywords: Public Key Cryptography, RSA Variant, Data
Secrecy
I. INTRODUCTION
In this age of universal electronic connectivity, the electronic
fraud is a matter of concern. There is indeed need to store the
information securely. This has led to a heightened awareness
to protect data and resources from disclosure, to ensure the
authenticity of data and messages, and also to protect systems
from network based attacks. Cryptography is the science of
encryption. Cryptography plays a central role in mobile phone
communications, electronic commerce, sending or receiving
private emails, transaction processing, providing security to
ATM cards, securing computer from unauthorized access,
digital signature and also touches on many aspects of our daily
lives. Cryptography consists of all the principles and methods
of transforming an intelligible message called plaintext into
one that is unintelligible called cipher text and then
retransforming that message back to its original Form. In
modern era, the cryptography is considered to be a branch of
both mathematics and computer science. It is also affiliated
closely with information & communication theory. Although
in the past, the role of cryptography referred only to the
encryption and decryption of message using secret keys. But
nowadays, the cryptography is used in many areas; it is
because of the digitization.
It is generally classified into two categories, the
symmetric and asymmetric. The data transferred from one
system to another over public network can be protected by the
method of encryption. On encryption the data is encrypted or
scrambled by any encryption algorithm using the key. The
user having the access to the same key can decrypt the
encrypted data. Such a cryptosystem is known as private key
or symmetric key cryptography. There are many standard
symmetric key algorithms available. Some popular ones are
as:. AES advanced encryption standard, 3DES triple data
encryption standard etc. All these standard symmetric
algorithms defined are proven to be highly secured and time
tested. The main problem related to these algorithms is the
key exchange. All the communicating parties require a shared
secret key. This key is required to exchange between them to
establish a secured communication. Therefore the security of
the symmetric key algorithm depends on the security of the
secret key. The Key size is typically hundreds of bits in
length. The key size also depends on the algorithm used. The
key cannot be shared online. Also when a large number of
communicating parties are there, then in that case the key
exchange is infeasible & very difficult too. All such problems
are countered by the public key cryptography. In public key
algorithm a shared secret can be established online between
communicating parties without any need for exchanging any
secret data
II. LITERATURE SURVEY
Fault-based attacks are the attacks which are capable of
recovering secret keys by. The fault based attacks introducing
one or more faults in and then analyzes the output. It is a very
powerful method to crack the key. The work done by Kun Ma
et al in [1] contains a novel Concurrent Error Detection
scheme to overcome the problem due to fault-based attack
against RSA. This proposed method is based on the concept of
the multiplicative homomorphism property. The time
overhead of this technique is more. Alexandra Boldyreva,
Hideki Imai proposed another variant of RSA[2]. It is known
as RSA-OAEP. It is based on OAEP. OAEP is one of the most
popular and well formatted public-key encryption scheme. It
was originally designed by Bellare and Rogaway.The OAEP
is based on a trapdoor permutation. But the guaranteed level
of security is not very high for a practical parameter choice.
The authors [2] proposed a very simple modification of the
OAEP encryption in which the trapdoor permutation instance
is only applied to a part of the OAEP transform. The security
is tight in this updated version. OAEP can also be used to
encrypt long messages without using hybrid encryption.
The work done in [3] focuses on the problem of how
to prevent the fast RSA signature and decryption computation
with residue number system speedup from a hardware fault
cryptanalysis in a highly reliable and efficient approach. It is a
well known fact that the CRT-based speedup for RSA
signature has been widely used. But it is a possibility that a
hardware fault cryptanalysis can totally break the RSA system
by factoring the public modulus. Many solution exist to
counter this problem. But we have observed that very few of
these existing solutions are both sound and efficient.
Experimental results have shown that the expanded modulus
approach proposed by Shamir is superior to the approach of
using a simple verification function when other physical
cryptanalysis. The proposed work is based on the concepts of
fault infective CRT computation and fault infective CRT
recombination.RSA is the asymmetric or public key
cryptography system. The security of RSA public key
A Literature Review of Some Modern RSA Variants
(IJSRD/Vol. 2/Issue 08/2014/046)
All rights reserved by www.ijsrd.com 248
cryptosystem is based on the larger value of modulus. One of
the main problems associated to RSA cryptosystem is
factorization. The authors [4] proposed a new special purpose
algorithm to perform factorization. This algorithm is
compared with trial division algorithm TDM. The
experimental results prove that the” and “References”.
Proposed algorithms runtime depends on the difference of
factors and is independent of size of the modulus. So it is
more effective whenever factors are close to each other & in
that particular case it outperforms the TDM.Giraud [7]
proposed a new countermeasure scheme based on the concept
of Montgomery Ladder Exponentiation. The proposed
algorithm performs two modular multiplications for each bit
of exponent. Whereas the square and multiply algorithm
which performs on average 1.5 modular multiplications per bit
of the exponent. Therefore the proposed method is faster.
The authors of [5] proposed an enhance algorithm for
the RSA cryptosystem. This new proposed cryptosystem uses
a third prime number in calculating the value of n. This
additional third prime number increases the factor complexity
of n. It will provide more security to the RSA.
The public key cryptosystem RSA is the first and
most popular cryptosystem for performing encryption and
decryption of data, to keep data secret, to transfer data from
one location to another. Also it is known that the security of
RSA depends on large factorization. If the factorization is
possible then the whole algorithm can become breakable.
Authors [6] proposed a new methodology to change the
original modulus with the fake modulus. Therefore if the
hacker factorizes this new modulus value then he will not be
able to locate the original decryption key.
III. COMMON PROBLEMS IN EXISTING RSA VARIANTS
The main disadvantage of RSA encryption its slower
speed.
(1) Not secure against Weiner’s attack
(2) Not secure against common modulus attack
(3) Not secure against known plaintext attack
(4) Not secure against low decryption exponent attack
IV. CONCLUSION
In this paper, the introduction & the application of
cryptography is given. The problems related to private keys
are discussed. The public key cryptography & its utility in so
many areas of the life are discussed. The modern variants of
the RSA cryptosystem are discussed with their merits and
demerits. RSA is the most popular method for encryption &
decryption. It provides a large level of security. It provides
strong security because of the large key size. In this paper, we
have proposed a comprehensive survey over the various
variant of the RSA algorithm. Each RSA variant is discussed
with its advantages & disadvantages. This review will help
the researchers in making a much strong & secure RSA
cryptosystem.
REFERENCES
[1] Kun Ma, Han Liang, and Kaijie Wu, Member, IEEE,
“Homomorphism Property-Based Concurrent Error
Detection of RSA: A Countermeasure to Fault
Attack”, IEEE TRANSACTIONS ON COMPUTERS,
VOL. 61, NO. 7, JULY 2012
[2] Alexandra Boldyreva, Hideki Imai, Life Fellow, IEEE,
and Kazukuni Kobara, “How to Strengthen the Security
of RSA-OAEP”, IEEE TRANSACTIONS ON
INFORMATION THEORY, VOL. 56, NO. 11,
NOVEMBER 2010
[3] Sung-Ming Yen, Seungjoo Kim, Seongan Lim, and
Sang-Jae Moon,” RSA Speedup with Chinese
Remainder Theorem Immune against Hardware Fault
Cryptanalysis”IEEE TRANSACTIONS ON
COMPUTERS, VOL. 52, NO. 4, APRIL 2003
[4] Prashant Sharma, “Modified Integer Factorization
Algorithm using V-Factor Method”, 2012 Second
International Conference on Advanced Computing &
Communication Technologies, IEEE 2012.
[5] J. Padhye, V. Firoiu, and D. Towsley, “A stochastic
model of TCP Reno congestion avoidance and control,”
Univ. Of Massachusetts, Amherst, MA, CMPSCI Tech.
Rep. 99-02, 1999.
[6] Wireless LAN Medium Access Control(MAC)and
Physical Layer (PHY) Specification, IEEE Std. 802.11,
1997.
[7] m. Wegmuller, j. P. Von der weid, p. Oberson, and n.
Gisin, “high resolution fibber distributed measurements
with coherent ofdr,” in proc. Ecoc’00, 2000, paper
11.3.4, p. 109.
[8] r. E. Sorace, v. S. Reinhardt, and s. A. Vaughn, “high-
speed digital-to-rf converter,” u.s. patent 5 668 842,
sept. 16, 1997.
[9] (2002) The IEEE website. [Online]. Available:
http://www.ieee.org/
[10]M. Shell. (2002) ieeetran homepage on CTAN.
[Online]. Available:http://www.ctan.org/tex
archive/macros/latex/contrib/supported/ieeetran/
[11]FLEXChip Signal Processor (MC68175/D), Motorola,
1996
[12]“PDCA12-70 data sheet,” Opto Speed SA, Mezzovico,
Switzerland.
[13]Karnik, “performance of tcp congestion control with
rate feedback: tcp/abr and rate adaptive tcp/ip,” m. Eng.
Thesis, indian institute of science, bangalore, india, jan.
1999.
[14]j. Padhye, v. Firoiu, and d. Towsley, “a stochastic
model of tcp reno congestion avoidance and control,”
univ. Of Massachusetts, Amherst, ma, cmpsci tech.
Rep. 99-02, 1999.
[15]Wireless LAN Medium Access Control (MAC) and
Physical Layer (PHY) Specification, IEEE Std. 802.11,
1997.

More Related Content

What's hot

Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography cscpconf
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationIRJET Journal
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12Arindam Paul
 
Neural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key ExchangeNeural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key ExchangeIJMTST Journal
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...csandit
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesjournalBEEI
 
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...ijcisjournal
 
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...Sai Vikas Gunti
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
 
Study and implementation of DES on FPGA
Study and implementation of DES on FPGAStudy and implementation of DES on FPGA
Study and implementation of DES on FPGAVenkata Kishore
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
 
ITNW 2164 ResearchPaper
ITNW 2164 ResearchPaperITNW 2164 ResearchPaper
ITNW 2164 ResearchPaperManuel Garza
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystemsijtsrd
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 

What's hot (20)

Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
 
Neural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key ExchangeNeural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key Exchange
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniques
 
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
 
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
 
Study and implementation of DES on FPGA
Study and implementation of DES on FPGAStudy and implementation of DES on FPGA
Study and implementation of DES on FPGA
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
 
ITNW 2164 ResearchPaper
ITNW 2164 ResearchPaperITNW 2164 ResearchPaper
ITNW 2164 ResearchPaper
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Encryption
EncryptionEncryption
Encryption
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 

Similar to A Literature Review of Some Modern RSA Variants

Techniques of lattice based
Techniques of lattice basedTechniques of lattice based
Techniques of lattice basedijcsa
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithmpaperpublications3
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...IJCI JOURNAL
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
 
Cryptography And Embedded Systems Used
Cryptography And Embedded Systems UsedCryptography And Embedded Systems Used
Cryptography And Embedded Systems UsedCarla Bennington
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithmijtsrd
 
Particle magic need for quantum
Particle magic need for quantumParticle magic need for quantum
Particle magic need for quantumijaia
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
 
Modified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachModified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachTELKOMNIKA JOURNAL
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
 
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAA NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAijsptm
 
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationImproving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationAM Publications,India
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map cscpconf
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYIJNSA Journal
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSJournal For Research
 

Similar to A Literature Review of Some Modern RSA Variants (20)

Techniques of lattice based
Techniques of lattice basedTechniques of lattice based
Techniques of lattice based
 
RSA 32-bit Implementation Technique
RSA 32-bit Implementation TechniqueRSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
Cryptography And Embedded Systems Used
Cryptography And Embedded Systems UsedCryptography And Embedded Systems Used
Cryptography And Embedded Systems Used
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
Particle magic need for quantum
Particle magic need for quantumParticle magic need for quantum
Particle magic need for quantum
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
Modified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachModified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approach
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAA NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATA
 
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationImproving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and Authentication
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 

Recently uploaded (20)

9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

A Literature Review of Some Modern RSA Variants

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 08, 2014 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 247 A Literature Review of Some Modern RSA Variants Akansha Tuteja1 Amit Shrivastava2 1,2 Department of Computer Science & Engineering 1,2 RGPV University, SVCE Indore, India Abstract— RSA cryptosystem is the most commonly used public key cryptosystem. It is the first public key cryptosystem. The strength of this cryptosystem is based on the larger key size. There are many algorithms and variants of RSA. But, it is steal a burning topic of research. Because the thrust to store data secret is never going to end. In this paper, we have proposed a literature review of some modern variants of the RSA algorithm. All the algorithms have been analyzed. Their merits and demerits are also discussed. Keywords: Public Key Cryptography, RSA Variant, Data Secrecy I. INTRODUCTION In this age of universal electronic connectivity, the electronic fraud is a matter of concern. There is indeed need to store the information securely. This has led to a heightened awareness to protect data and resources from disclosure, to ensure the authenticity of data and messages, and also to protect systems from network based attacks. Cryptography is the science of encryption. Cryptography plays a central role in mobile phone communications, electronic commerce, sending or receiving private emails, transaction processing, providing security to ATM cards, securing computer from unauthorized access, digital signature and also touches on many aspects of our daily lives. Cryptography consists of all the principles and methods of transforming an intelligible message called plaintext into one that is unintelligible called cipher text and then retransforming that message back to its original Form. In modern era, the cryptography is considered to be a branch of both mathematics and computer science. It is also affiliated closely with information & communication theory. Although in the past, the role of cryptography referred only to the encryption and decryption of message using secret keys. But nowadays, the cryptography is used in many areas; it is because of the digitization. It is generally classified into two categories, the symmetric and asymmetric. The data transferred from one system to another over public network can be protected by the method of encryption. On encryption the data is encrypted or scrambled by any encryption algorithm using the key. The user having the access to the same key can decrypt the encrypted data. Such a cryptosystem is known as private key or symmetric key cryptography. There are many standard symmetric key algorithms available. Some popular ones are as:. AES advanced encryption standard, 3DES triple data encryption standard etc. All these standard symmetric algorithms defined are proven to be highly secured and time tested. The main problem related to these algorithms is the key exchange. All the communicating parties require a shared secret key. This key is required to exchange between them to establish a secured communication. Therefore the security of the symmetric key algorithm depends on the security of the secret key. The Key size is typically hundreds of bits in length. The key size also depends on the algorithm used. The key cannot be shared online. Also when a large number of communicating parties are there, then in that case the key exchange is infeasible & very difficult too. All such problems are countered by the public key cryptography. In public key algorithm a shared secret can be established online between communicating parties without any need for exchanging any secret data II. LITERATURE SURVEY Fault-based attacks are the attacks which are capable of recovering secret keys by. The fault based attacks introducing one or more faults in and then analyzes the output. It is a very powerful method to crack the key. The work done by Kun Ma et al in [1] contains a novel Concurrent Error Detection scheme to overcome the problem due to fault-based attack against RSA. This proposed method is based on the concept of the multiplicative homomorphism property. The time overhead of this technique is more. Alexandra Boldyreva, Hideki Imai proposed another variant of RSA[2]. It is known as RSA-OAEP. It is based on OAEP. OAEP is one of the most popular and well formatted public-key encryption scheme. It was originally designed by Bellare and Rogaway.The OAEP is based on a trapdoor permutation. But the guaranteed level of security is not very high for a practical parameter choice. The authors [2] proposed a very simple modification of the OAEP encryption in which the trapdoor permutation instance is only applied to a part of the OAEP transform. The security is tight in this updated version. OAEP can also be used to encrypt long messages without using hybrid encryption. The work done in [3] focuses on the problem of how to prevent the fast RSA signature and decryption computation with residue number system speedup from a hardware fault cryptanalysis in a highly reliable and efficient approach. It is a well known fact that the CRT-based speedup for RSA signature has been widely used. But it is a possibility that a hardware fault cryptanalysis can totally break the RSA system by factoring the public modulus. Many solution exist to counter this problem. But we have observed that very few of these existing solutions are both sound and efficient. Experimental results have shown that the expanded modulus approach proposed by Shamir is superior to the approach of using a simple verification function when other physical cryptanalysis. The proposed work is based on the concepts of fault infective CRT computation and fault infective CRT recombination.RSA is the asymmetric or public key cryptography system. The security of RSA public key
  • 2. A Literature Review of Some Modern RSA Variants (IJSRD/Vol. 2/Issue 08/2014/046) All rights reserved by www.ijsrd.com 248 cryptosystem is based on the larger value of modulus. One of the main problems associated to RSA cryptosystem is factorization. The authors [4] proposed a new special purpose algorithm to perform factorization. This algorithm is compared with trial division algorithm TDM. The experimental results prove that the” and “References”. Proposed algorithms runtime depends on the difference of factors and is independent of size of the modulus. So it is more effective whenever factors are close to each other & in that particular case it outperforms the TDM.Giraud [7] proposed a new countermeasure scheme based on the concept of Montgomery Ladder Exponentiation. The proposed algorithm performs two modular multiplications for each bit of exponent. Whereas the square and multiply algorithm which performs on average 1.5 modular multiplications per bit of the exponent. Therefore the proposed method is faster. The authors of [5] proposed an enhance algorithm for the RSA cryptosystem. This new proposed cryptosystem uses a third prime number in calculating the value of n. This additional third prime number increases the factor complexity of n. It will provide more security to the RSA. The public key cryptosystem RSA is the first and most popular cryptosystem for performing encryption and decryption of data, to keep data secret, to transfer data from one location to another. Also it is known that the security of RSA depends on large factorization. If the factorization is possible then the whole algorithm can become breakable. Authors [6] proposed a new methodology to change the original modulus with the fake modulus. Therefore if the hacker factorizes this new modulus value then he will not be able to locate the original decryption key. III. COMMON PROBLEMS IN EXISTING RSA VARIANTS The main disadvantage of RSA encryption its slower speed. (1) Not secure against Weiner’s attack (2) Not secure against common modulus attack (3) Not secure against known plaintext attack (4) Not secure against low decryption exponent attack IV. CONCLUSION In this paper, the introduction & the application of cryptography is given. The problems related to private keys are discussed. The public key cryptography & its utility in so many areas of the life are discussed. The modern variants of the RSA cryptosystem are discussed with their merits and demerits. RSA is the most popular method for encryption & decryption. It provides a large level of security. It provides strong security because of the large key size. In this paper, we have proposed a comprehensive survey over the various variant of the RSA algorithm. Each RSA variant is discussed with its advantages & disadvantages. This review will help the researchers in making a much strong & secure RSA cryptosystem. REFERENCES [1] Kun Ma, Han Liang, and Kaijie Wu, Member, IEEE, “Homomorphism Property-Based Concurrent Error Detection of RSA: A Countermeasure to Fault Attack”, IEEE TRANSACTIONS ON COMPUTERS, VOL. 61, NO. 7, JULY 2012 [2] Alexandra Boldyreva, Hideki Imai, Life Fellow, IEEE, and Kazukuni Kobara, “How to Strengthen the Security of RSA-OAEP”, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 11, NOVEMBER 2010 [3] Sung-Ming Yen, Seungjoo Kim, Seongan Lim, and Sang-Jae Moon,” RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis”IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 4, APRIL 2003 [4] Prashant Sharma, “Modified Integer Factorization Algorithm using V-Factor Method”, 2012 Second International Conference on Advanced Computing & Communication Technologies, IEEE 2012. [5] J. Padhye, V. Firoiu, and D. Towsley, “A stochastic model of TCP Reno congestion avoidance and control,” Univ. Of Massachusetts, Amherst, MA, CMPSCI Tech. Rep. 99-02, 1999. [6] Wireless LAN Medium Access Control(MAC)and Physical Layer (PHY) Specification, IEEE Std. 802.11, 1997. [7] m. Wegmuller, j. P. Von der weid, p. Oberson, and n. Gisin, “high resolution fibber distributed measurements with coherent ofdr,” in proc. Ecoc’00, 2000, paper 11.3.4, p. 109. [8] r. E. Sorace, v. S. Reinhardt, and s. A. Vaughn, “high- speed digital-to-rf converter,” u.s. patent 5 668 842, sept. 16, 1997. [9] (2002) The IEEE website. [Online]. Available: http://www.ieee.org/ [10]M. Shell. (2002) ieeetran homepage on CTAN. [Online]. Available:http://www.ctan.org/tex archive/macros/latex/contrib/supported/ieeetran/ [11]FLEXChip Signal Processor (MC68175/D), Motorola, 1996 [12]“PDCA12-70 data sheet,” Opto Speed SA, Mezzovico, Switzerland. [13]Karnik, “performance of tcp congestion control with rate feedback: tcp/abr and rate adaptive tcp/ip,” m. Eng. Thesis, indian institute of science, bangalore, india, jan. 1999. [14]j. Padhye, v. Firoiu, and d. Towsley, “a stochastic model of tcp reno congestion avoidance and control,” univ. Of Massachusetts, Amherst, ma, cmpsci tech. Rep. 99-02, 1999. [15]Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Std. 802.11, 1997.