Education, Science, Technology, Innovation and Life
Open Access
Sign In

RSA Cryptosystem Speed Security Enhancement (Hybrid and Parallel Domain Approach)

Download as PDF

DOI: 10.23977/crypis.2023.020101 | Downloads: 33 | Views: 909

Author(s)

Moise Ngendahimana 1, Wei Shen 1

Affiliation(s)

1 College of Information Science and Engineering, Zhejiang Sci-Tech University, Hangzhou, Zhejiang, 310018, China

Corresponding Author

Moise Ngendahimana

ABSTRACT

Encryption involves every aspect of working with and learning about codes. Over the last 40 years, it has grown in prominence to become a prominent scholarly discipline. Because most interactions now take place online, people require secure means of transmitting sensitive information. Several modern cryptosystems rely on public keys as a crucial component of their architecture. The major purpose of this research is to improve the speed and security of the RSA algorithm. By employing Linear Congruential Generator (LCG) random standards for randomly generating a list of large primes; and by employing other selected algorithms, such as the Chinese Remainder Theorem (CRT) in decryption, exponent selection conditions, the Fast Exponentiation Algorithm for encryption, and finally, a comparison of the enhanced RSA versus the normal RSA algorithm that shows an improvement will be provided.

KEYWORDS

Cryptography; Pseudo-random numbers; Fast Exponentiation; Chinese Remainder Theorem; RSA Encryption and Decryption; Linear Congruential Generator

CITE THIS PAPER

Moise Ngendahimana, Wei Shen, RSA Cryptosystem Speed Security Enhancement (Hybrid and Parallel Domain Approach). Crypto and Information Security (2023) Vol. 2: 1-20. DOI: http://dx.doi.org/10.23977/crypis.2023.020101.

REFERENCES

[1] T. S. Obaid, Study a public key in rsa algorithm, European Journal of Engineering and Technology Research 5 (4) (2020) 395–398.
[2] S. A. Jaju, S. S. Chowhan, A modified rsa algorithm to enhance security for digital signature, in: 2015 international conference and workshop on computing and communication (IEMCON), IEEE, 2015, pp. 1–5.
[3] L. A. Koster, J. E. Meinardi, B. L. Kaptein, E. Van der Linden-Van der Zwaag, R. G. Nelissen, Two-year rsa migration results of symmetrical and asymmetrical tibial components in total knee arthroplasty: a randomized controlled trial, The Bone & Joint Journal 103 (5) (2021) 855–863.
[4] R. Imam, Q. M. Areeb, A. Alturki, F. Anwer, Systematic and critical review of rsa based public key cryptographic schemes: Past and present status, IEEE Access 9 (2021) 155949–155976.
[5] N. Moise, Rsa-public-key-codes, https://github.com/NMoise/RSA-public-key-codes (2023).
[6] S. Chandra, S. Paira, S. S. Alam, G. Sanyal, A comparative survey of symmetric and asymmetric key cryptography, in: 2014 international conference on electronics, communication and computational engineering (ICECCE), IEEE, 2014, pp. 83–93.
[7] J. N. Gaithuru, M. Bakhtiari, M. Salleh, A. M. Muteb, A comprehensive literature review of asymmetric key cryptography algorithms for establishment of the existing gap, in: 2015 9th Malaysian Software Engineering Conference (MySEC), IEEE, 2015, pp. 236–244.
[8] S. F. Mare, M. Vladutiu, L. Prodan, Secret data communication system using steganography, aes and rsa, in: 2011 IEEE 17th International Symposium for Design and Technology in Electronic Packaging (SIITME), IEEE, 2011, pp. 339–344.
[9] D. Boneh, H. Shacham, Fast variants of rsa, CryptoBytes 5 (1) (2002) 1–9.
[10] C. A. M. Paixao, D. L. Gazzoni Filho, An efficient variant of the rsa cryptosystem, in: Anais do V Simp ́osio Brasileiro em Seguran ̧ca da Informa ̧c ̃ao e de Sistemas Computacionais, SBC, 2005, pp. 14–27.
[11] S. Gupta, J. Sharma, A hybrid encryption algorithm based on rsa and diffie-hellman, in: 2012 IEEE International Conference on Computational Intelligence and Computing Research, IEEE, 2012, pp. 1–4.
[12] R. S. Dhakar, A. K. Gupta, P. Sharma, Modified rsa encryption algorithm (mrea), in: 2012 second international conference on advanced computing & communication technologies, IEEE, 2012, pp. 426–429.
[13] J. M. Ahmed, Z. M. Ali, The enhancement of computation technique by combining rsa and el-gamal cryptosystems, in: Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, IEEE, 2011, pp. 1–5.
[14] V. S. Mahalle, A. K. Shahade, Enhancing the data security in cloud by implementing hybrid (rsa & aes) encryption algorithm, in: 2014 International Conference on Power, Automation and Communication (INPAC), IEEE, 2014, pp. 146–149.
[15] S. Arora, Enhancing cryptographic security using novel approach based on enhanced-rsa and elamal: Analysis and comparison, International Journal of Computer Applications 975 (2015) 8887.
[16] E. Jintcharadze, M. Iavich, Hybrid implementation of twofish, aes, elgamal and rsa cryptosystems, in: 2020 IEEE East-West Design & Test Symposium (EWDTS), IEEE, 2020, pp. 1–5.
[17] Z. Alamsyah, T. Mantoro, U. Adityawarman, M. A. Ayu, Combination rsa with one time pad for enhanced scheme of two-factor authentication, in: 2020 6th International Conference on Computing Engineering and Design (ICCED), IEEE, 2020, pp. 1–5.
[18] C. W. Chiou, Parallel implementation of the rsa public-key cryptosystem, International Journal of Computer Mathematics 48 (3-4) (1993) 153–155.
[19] M. A. Ayub, Z. A. Onik, S. Smith, Parallelized rsa algorithm: An analysis with performance evaluation using openmp library in high performance computing environment, in: 2019 22nd International Conference on Computer and Information Technology (ICCIT), IEEE, 2019, pp. 1–6.
[20] A. Rawat, K. Sehgal, A. Tiwari, A. Sharma, A. Joshi, A novel accelerated implementation of rsa using parallel processing, Journal of Discrete Mathematical Sciences and Cryptography 22 (2) (2019) 309–322.
[21] C.-H. Wu, J.-H. Hong, C.-W. Wu, Rsa cryptosystem design based on the chinese remainder theorem, in: Proceedings of the 2001 Asia and South Pacific Design automation conference, 2001, pp. 391–395.
[22] J. Bl ̈omer, M. Otto, J.-P. Seifert, A new crt-rsa algorithm secure against bellcore attacks, in: Proceedings of the 10th ACM conference on Computer and communications security, 2003, pp. 311–320.
[23] K. Sony, D. Shaik, B. D. Sri, G. Anitha, Improvised asymmetric key encryption algorithm using matlab, IOSR Journal of Electronics and Communication Engineering 10 (2) (2015) 31–36.
[24] J.-J. Quisquater, C. Couvreur, Fast decipherment algorithm for rsa public-key cryptosystem, Electronics letters 21 (18) (1982) 905–907.
[25] P. Aiswarya, A. Raj, D. John, L. Martin, G. Sreenu, Binary rsa encryption algorithm, in: 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), IEEE, 2016, pp. 178–181.
[26] J. Sahu, V. Singh, V. Sahu, A. Chopra, An enhanced version of rsa to increase the security, Journal of Network Communications and Emerging Technologies (JNCET) 7 (2017) 1–4.
[27] R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM 21 (2) (1978) 120–126.
[28] M. Rouse, Digital signature network security, Search Security. Tech-Target, 2014.
[29] S. Nisha, M. Farik, Rsa public key cryptography algorithm, A Review. International Journal of Scientific and Technological Research 6 (2017) 187–191.
[30] T. E. Hull, A. R. Dobell, Random number generators, SIAM review 4 (3) (1962) 230–254.
[31] M. O. Rabin, Probabilistic algorithm for testing primality, Journal of number theory 12 (1) (1980) 128–138.
[32] L. C. C. Garcıa, Can sch ̈onhage multiplication speed up the rsa decryption or encryption? Technische Universit ̈at Darmstadt, 2007.
[33] C. Intila, B. Gerardo, R. Medina, A study of public key 'e' in rsa algorithm, in: IOP Conference Series: Materials Science and Engineering, Vol. 482, IOP Publishing, 2019, p. 012016.
[34] C. Thirumalai, Review on the memory efficient rsa variants, International Journal of Pharmacy and Technology 8 (4) (2016) 4907–4916.
[35] K. Moriarty, B. Kaliski, J. Jonsson, A. Rusch, Pkcs# 1: Rsa cryptography specifications version 2.2, Tech. rep. (2016).
[36] U. V. V. S. Dasgupta, C. H. Papadimitriou, Algorithms, McGraw-Hill Education, 2006.
[37] W. Stallings, G. Bressan, A. Barbosa, Criptografia e seguran ̧ca de redes, Pearson Educacion, 2008.

Downloads: 70
Visits: 4778

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.