Abstract

In this era of digital age a lot of secret and non-secret data is transmitted over the internet. Cryptography is one of the many techniques to secure data on network. It is one of the techniques that can be used to ensure information security and data privacy. It is used to secure data in rest as well as data in transit. RSA in the most commonly used cryptographic algorithm and it is also used for the creation on Digital Certificates. RSA algorithm is now not considered to be as secure due to advancement in technology and newer attack vectors. This paper proposed an algorithm for security enhancement of RSA algorithm by increasing prime numbers count. Proposed algorithm has been implemented to encrypt and decrypt the data and execution results for encryption and decryption time have been compared for increased prime numbers count. This proposed algorithm of RSA can be used to replace the existing RSA algorithm in digital signature certificates as well as in all other places where the base RSA algorithm is currently being used. In the proposed technique, as the number of prime number count increases, prime factor calculation becomes difficult. If the attacker has encryption key (e) and Product of prime numbers (N) then it is not easy to find out the prime number combinations and hence decryption key (d) will be more secure by using proposed algorithm. This will be more difficult because given a number n, it is easy to find two numbers whose product is equal to n using Shor's algorithm and Grover’s Search Algorithm but it is not very difficult and time taking to exactly determine m numbers whose product is equal to n.

Highlights

  • Cryptography is a technique to make a readable data into unreadable data

  • This paper proposed an algorithm for security enhancement of RSA

  • Proposed algorithm has been implemented to encrypt and decrypt the data and execution results for encryption and decryption time have been compared for increased prime numbers count

Read more

Summary

INTRODUCTION

Cryptography is a technique to make a readable data into unreadable data. Modern cryptography is part of mathematics and technology of computer science.[1],[2],[3]. The attack on the availability is called interruption [3],[4],[5]. This is an open access article under the CC. 4) Authentication: It helps establish proof of identities. It ensures that the origin of a documents or message is correctly identified. Suppose that third party C sends an electronic message over the internet to receiver B. The third-party C had posed as Sender A when C sent this document to user B. This type of attack is called as fabrication [3],[4],[5] Who is posing as Sender A.? This type of attack is called as fabrication [3],[4],[5]

Types of Cryptosystem
FLOW CHART
RESULT
PERFORMANCE ANALYSIS OF PROPOSED
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.