rsa cryptography
Recently Published Documents


TOTAL DOCUMENTS

72
(FIVE YEARS 23)

H-INDEX

10
(FIVE YEARS 2)

2022 ◽  
Vol 2161 (1) ◽  
pp. 012014
Author(s):  
Chiradeep Gupta ◽  
N V Subba Reddy

Abstract Cryptography is related and referred to as the secured transmission of messages amongst the sender and the intended receiver by ensuring confidentiality, integrity, and authentication. Diffie – Hellman (DH) key exchange protocol is a well-known algorithm that would generate a shared secret key among the sender and the intended receiver, and the basis of cryptosystems for using public and private key for encryption and decryption process. But it is severely affected by the Man in the Middle (MITM) attack that would intercept and manipulate thus eavesdropping the shared secret key. This paper proposes a model of integrating the public-key RSA cryptography system with the DH key exchange to prevent the MITM attack. The performance of the proposed work has been compared to the DH Key Exchange algorithm as well as RSA Cryptosystem to conclude for effectiveness of the proposed model.


2021 ◽  
Vol 10 (02) ◽  
pp. 225-231
Author(s):  
V.Selva Bhuvaneshwari ◽  
D.Angeline Rangithamani ◽  
K.Aathi Vignesh

E-voting system based on and improved from our previous work .E-voting system, referred to as Enhanced note is enhanced with a new protocol design and watchdog hardware device to ensure voter confidentiality and voting accuracy. The watchdog device records all voting transactions to prevent voter frauds.The RSA cryptography algorithm ensures that votes casted are secured, thus maintaining the privacy of votes.The system is such that when the votes are cast on the nodes, the RSA technique encrypts the vote that is sent to the server system using both node and vote identity number.


Author(s):  
Yogi Suryo Santoso

The process of exchanging digital messages is increasingly being used due to its easy and practical use. But the process of exchanging digital messages is vulnerable to being tapped by unauthorized people. Cryptography is the study of mathematical techniques related to aspects of information security, such as data confidentiality, data validity, data integrity, and data authentication. With cryptography, the process of exchanging messages between two people can be done securely. Thus, cryptographic techniques are used to overcome security issues when exchanging messages. The methods used in this study are hybrid hill cipher and RSA cryptography. In this study it was shown that hybrid hill cipher cryptography with a 3x3 matrix key and RSA with a 512 bit key can overcome security issues when exchanging data so that messages sent cannot be read by unauthorized people.


IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Osama F. AbdelWahab ◽  
Ashraf A.M. Khalaf ◽  
Aziza I. Hussein ◽  
Hesham F. A. Hamed
Keyword(s):  

2021 ◽  
Vol 182 ◽  
pp. 5-12
Author(s):  
Osama F. AbdelWahab ◽  
Aziza I. Hussein ◽  
Hesham F.A. Hamed ◽  
Hamdy M. Kelash ◽  
Ashraf A.M. Khalaf

2020 ◽  
Vol 1641 ◽  
pp. 012042
Author(s):  
Hengki Tamando Sihotang ◽  
Syahril Efendi ◽  
Elvyawati M Zamzami ◽  
Herman Mawengkang

2020 ◽  
Author(s):  
I Made Ari Dwi Suta Atmaja ◽  
I Nyoman Gede Arya Astawa ◽  
Ni Wayan Wisswani ◽  
I Made Riyan Adi Nugroho ◽  
Putu Wijaya Sunu ◽  
...  
Keyword(s):  

2020 ◽  
Author(s):  
Tao Wu

Abstract Modular exponentiation is fundamental in computer arithmetic and is widely applied in cryptography such as ElGamal cryptography, Diffie-Hellman key exchange protocol, and RSA cryptography. Implementation of modular exponentiation in residue number system leads to high parallelism in computation, and has been applied in many hardware architectures. While most RNS based architectures utilizes RNS Montgomery algorithm with two residue number systems, the recent modular multiplication algorithm with sum-residues performs modular reduction in only one residue number system with about the same parallelism. In this work, it is shown that high-performance modular exponentiation and RSA cryptography can be implemented in RNS. Both the algorithm and architecture are improved to achieve high performance with extra area overheads, where a 1024-bit modular exponentiation can be completed in 0.567 ms in Xilinx XC6VLX195t-3 platform, costing 26,489 slices, 87,357 LUTs, 363 dedicated multipilers of $18\times 18$ bits, and 65 Block RAMs.


Author(s):  
Eko Hariyanto Hariyanto ◽  
Muhammad Zarlis ◽  
Darmeli Nasution Nasution ◽  
Sri Wahyuni

 Security of RSA cryptography lied in the difficulty of factoring the number p and q bacame the prime factor. The greater the value of p and q used, the better the security level was. However, this could result in a very slow decryption process. The most commonly used and discussed method of speeding up the encryption and decryption process in RSA was the Chinese Remainder Theorem (CRT). Beside that method, there was another method with the same concept with CRT namely Aryabhata Remainder Theorem which was also relevant used in public key cryptography such as RSA. The purpose of this study was to obtain an effective method to RSA especially in the decryption process based on the calculation of the time complexity of computing.


Sign in / Sign up

Export Citation Format

Share Document