The “Naive” RSA Algorithm

Author(s):  
Nigel P. Smart
Keyword(s):  
Author(s):  
Ali Saleh Al Najjar

Absolute protection is a difficult issue to maintain the confidentiality of images through their transmission over open channels such as internet or networks and is a major concern in the media, so image Cryptography becomes an area of attraction and interest of research in the field of information security. The paper will offer proposed system that provides a special kinds of image Encryption image security, Cryptography using RSA algorithm for encrypted images by HEX function to extract HEX Code and using RSA public key algorithm, to generate cipher image text. This approach provides high security and it will be suitable for secured transmission of images over the networks or Internet.


2021 ◽  
Vol 15 (1) ◽  
pp. 408-433
Author(s):  
Margaux Dugardin ◽  
Werner Schindler ◽  
Sylvain Guilley

Abstract Extra-reductions occurring in Montgomery multiplications disclose side-channel information which can be exploited even in stringent contexts. In this article, we derive stochastic attacks to defeat Rivest-Shamir-Adleman (RSA) with Montgomery ladder regular exponentiation coupled with base blinding. Namely, we leverage on precharacterized multivariate probability mass functions of extra-reductions between pairs of (multiplication, square) in one iteration of the RSA algorithm and that of the next one(s) to build a maximum likelihood distinguisher. The efficiency of our attack (in terms of required traces) is more than double compared to the state-of-the-art. In addition to this result, we also apply our method to the case of regular exponentiation, base blinding, and modulus blinding. Quite surprisingly, modulus blinding does not make our attack impossible, and so even for large sizes of the modulus randomizing element. At the cost of larger sample sizes our attacks tolerate noisy measurements. Fortunately, effective countermeasures exist.


Author(s):  
Md Equebal Hussain ◽  
Mohammad Rashid Hussain

security is one of the most important concern on cloud computing therefore institutions are hesitating to host their data over cloud. Not all data can be afforded to move on the cloud (example accounts data). The main purpose of moving data over cloud is to reduce cost (infrastructure and maintenance), faster performance, easy upgrade, storage capacity but at the same time security is major concern because cloud is not private but maintained by third party over the internet, security issues like privacy, confidentiality, authorization (what you are allowed to do), authentication (who you are) and accounting (what you actually do) will be encountered. Variety of encryption algorithms required for higher level of security. In this paper we try to provide solution for better security by proposing a combined method of key exchange algorithm with encryption technique. Data stored in cloud can be protected from hackers using proposed solution because even if transmitted key is hacked of no use without user’s private key.


2021 ◽  
Vol 10 (02) ◽  
pp. 225-231
Author(s):  
V.Selva Bhuvaneshwari ◽  
D.Angeline Rangithamani ◽  
K.Aathi Vignesh

E-voting system based on and improved from our previous work .E-voting system, referred to as Enhanced note is enhanced with a new protocol design and watchdog hardware device to ensure voter confidentiality and voting accuracy. The watchdog device records all voting transactions to prevent voter frauds.The RSA cryptography algorithm ensures that votes casted are secured, thus maintaining the privacy of votes.The system is such that when the votes are cast on the nodes, the RSA technique encrypts the vote that is sent to the server system using both node and vote identity number.


Author(s):  
Nelson Darío Pantoja ◽  
Anderson Felipe Jiménez ◽  
Siler Amador Donado ◽  
Katerine Márceles
Keyword(s):  

2020 ◽  
Vol 5 (1) ◽  
pp. 61-66
Author(s):  
Ainafatul Nur Muslikah ◽  
Hardiana Riski Riswanto ◽  
Khamaida Safinah ◽  
Khadijah Fahmi Hayati Holle

Message sending is one activity that is often used by everyone. However, security in this message delivery system needs to be wary of spying or message piracy during the process of sending messages. Surely someone who sent the message does not know if someone's personal message has been stolen. With this initiative builds a security message using cryptographic RSA algorithm where the message sender or recipient of the message can send the message safely without being known to the message hijacker or spy. Cryptography that uses the RSA algorithm to secure messages. This RSA algorithm message will be decrypted with the public key and to encrypt the message. This application was built on the Android platform because the dominant person has an Android smartphone with a system that runs the length of the message character does not affect the speed at the time of sending the message to the recipient, and there is no limit on the length of the message character during the encryption process so that any length of the massage character can be encrypted well.


Sign in / Sign up

Export Citation Format

Share Document