Skip to main content
Top

2022 | OriginalPaper | Chapter

An Empirical Study of Secure and Complex Variants of RSA Scheme

Authors : Raza Imam, Faisal Anwer

Published in: Cyber Security, Privacy and Networking

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In today’s cyber  space, where large amounts of data are being exchanged and stored on remote storages, Cryptography plays a major role. Public key cryptography such as RSA is one its effective type, which uses two keys, one for encryption and one for decryption. Concerning the recent advancements in the domain of cryptography, many cryptographers have proposed various extended and enhanced form of RSA algorithms in order to improve the reliability and efficiency of the information security world. In this paper, we studied several extended forms of RSA algorithm. We implemented several and compare them in terms of its efficiency in terms of key generation, encryption and decryption time. Finally, we suggested a multipoint parallel RSA scheme to improve the overall algorithm execution speed compared to standard RSA. This method will also prove to be computationally less costly and more secure as compared to standard RSA.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Amalarethinam IG, Leena H (2017) Enhanced RSA algorithm with varying key sizes for data security in cloud. In: 2017 world congress on computing and communication technologies (WCCCT). IEEE, pp 172–175 Amalarethinam IG, Leena H (2017) Enhanced RSA algorithm with varying key sizes for data security in cloud. In: 2017 world congress on computing and communication technologies (WCCCT). IEEE, pp 172–175
2.
go back to reference Barney B (2010) Introduction to parallel computing, vol 6. Lawrence Livermore National Laboratory, p 10 Barney B (2010) Introduction to parallel computing, vol 6. Lawrence Livermore National Laboratory, p 10
3.
go back to reference Fan W, Chen X, Li X (2010) Parallelization of RSA algorithm based on compute unified device architecture. In: 2010 ninth international conference on grid and cloud computing. IEEE, pp 174–178 Fan W, Chen X, Li X (2010) Parallelization of RSA algorithm based on compute unified device architecture. In: 2010 ninth international conference on grid and cloud computing. IEEE, pp 174–178
4.
go back to reference Islam MA, Islam MA, Islam N, Shabnam B (2018) A modified and secured RSA public key cryptosystem based on “n’’ prime numbers. J Comput Commun 6:78CrossRef Islam MA, Islam MA, Islam N, Shabnam B (2018) A modified and secured RSA public key cryptosystem based on “n’’ prime numbers. J Comput Commun 6:78CrossRef
5.
go back to reference Ivy BPU, Mandiwa P, Kumar M (2012) A modified RSA cryptosystem based on ‘n’ prime numbers. Int J Eng Comput Sci 1:63–66 Ivy BPU, Mandiwa P, Kumar M (2012) A modified RSA cryptosystem based on ‘n’ prime numbers. Int J Eng Comput Sci 1:63–66
6.
go back to reference Maurer UM (1995) Fast generation of prime numbers and secure public-key cryptographic parameters. J Cryptol 8:123–155MathSciNetCrossRef Maurer UM (1995) Fast generation of prime numbers and secure public-key cryptographic parameters. J Cryptol 8:123–155MathSciNetCrossRef
7.
go back to reference Mezher AE (2018) Enhanced RSA cryptosystem based on multiplicity of public and private keys. Int J Electr Comput Eng 8:3949 Mezher AE (2018) Enhanced RSA cryptosystem based on multiplicity of public and private keys. Int J Electr Comput Eng 8:3949
8.
go back to reference Mumtaz M, Ping L (2019) Forty years of attacks on the RSA cryptosystem: a brief survey. J Discrete Math Sci Cryptogr 22:9–29CrossRef Mumtaz M, Ping L (2019) Forty years of attacks on the RSA cryptosystem: a brief survey. J Discrete Math Sci Cryptogr 22:9–29CrossRef
9.
go back to reference Patel SR, Shah K (2014) Security enhancement and speed monitoring of RSA algorithm. Int J Eng Dev Res 2:2057–63 Patel SR, Shah K (2014) Security enhancement and speed monitoring of RSA algorithm. Int J Eng Dev Res 2:2057–63
10.
go back to reference Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21:120–126MathSciNetCrossRef Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21:120–126MathSciNetCrossRef
11.
go back to reference Stallings W (2006) Cryptography and network security, 4th edn. Pearson Education, India Stallings W (2006) Cryptography and network security, 4th edn. Pearson Education, India
12.
go back to reference Thangavel M, Varalakshmi P, Murrali M, Nithya K (2015) An enhanced and secured RSA key generation scheme (ESRKGS). J Inf Secur Appl 20:3–10 Thangavel M, Varalakshmi P, Murrali M, Nithya K (2015) An enhanced and secured RSA key generation scheme (ESRKGS). J Inf Secur Appl 20:3–10
Metadata
Title
An Empirical Study of Secure and Complex Variants of RSA Scheme
Authors
Raza Imam
Faisal Anwer
Copyright Year
2022
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-8664-1_17