Abstract

Cryptography defines different methods and technologies used in ensuring communication between two parties over any communication medium is secure, especially in presence of a third part. This is achieved through the use of several methods, such as encryption, decryption, signing, generating of pseudo-random numbers, among many others. Cryptography uses a key, or some sort of a password to either encrypt or decrypt a message that needs to be kept secret. This is made possible using two classes of key-based encryption and decryption algorithms, namely symmetric and asymmetric algorithms. The best known and the most widely used public key system is RSA. This algorithm comprises of three phases, which are the key generation phase, encryption phase, and the decryption phase. Owing to the advancement in computing technology, RSA is prone to some security risks, which makes it less secure. The following paper preview different proposals on different methods used to enhance the RSA algorithm and increase its security. Some of these enhancements include combining the RSA algorithm with Diffie-Hellman or ElGamal algorithm, modification of RSA to include three or four prime numbers, offline storage of generated keys, a secured algorithm for RSA where the message can be encrypted using dual encryption keys, etc.

Highlights

  • The use of cryptography to conceal information dates back thousands of years ago

  • Cryptography can be defined as methods or techniques used in ensuring that exchange of information between two parties remain secure, and the information itself remains confidential, authentic, and maintains high level of integrity [8]

  • The recovery process of plaintext from the cipher text in symmetric key cryptography is done using the same key used in encryption, and a different decryption algorithm

Read more

Summary

INTRODUCTION

The use of cryptography to conceal information dates back thousands of years ago. Initially, cryptography was applied in the securing of military secrets. The encoded messages have been used by government, private entities, and militaries around the world to protect sensitive information From these applications, cryptography can be defined as methods or techniques used in ensuring that exchange of information between two parties remain secure, and the information itself remains confidential, authentic, and maintains high level of integrity [8]. SYMMETRIC AND ASYMMETRIC CRYPTOGRAPHY As indicated in the discussion above, cryptography uses a key, or some sort of a password to either encrypt or decrypt a message that needs to be kept secret. The recovery process of plaintext from the cipher text in symmetric key cryptography is done using the same key used in encryption, and a different decryption algorithm This is made possible by sharing the secret key between the sender and the receiver. Some examples of areas in which asymmetric is applied include Elgamal, RSA, Diffie-Hellman, and DSA

RSA ALGORITHM
KEY GENERATION
ENCRYPTION
DECRYPTION
RSA ALGORITHM LIMITATIONS
FACTORING RSA MODULUS
ENHANCEMENT PROPOSALS FOR RSA ALGORITHM
3.10. ENCRYPTION ALGORITHM USING DUAL MODULUS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call