Abstract
The interconnected digital world is generating enormous data that must be secured from unauthorized access. Advancement in technologies and new innovative methods applied by attackers play an instrumental role in breaching data security. Public key Cryptography provides a set of cryptographic algorithms in achieving data security through confidentiality, integrity and authentication. Among all cryptographic algorithms in general and public key cryptography in particular, RSA is one of the most widely used and applied algorithms. Since its inception, it is commonly being adopted in securing data across different domains such as cloud, image and others. Despite its importance and wide applications, no such systematic and extensive survey exists in the literature. A systematic and thorough study of RSA based cryptography is presented in this work covering several domains. All the available works in this direction are divided into 11 different categories, viz, Hybrid, Parallel, Cloud, Image, Multiple-Keys, Chinese-Remainder-Theorem-based, Digital-Signatures, K-Nearest-Theorem-based, Batch, Wireless, and Core-Modifications. This study methodically explores RSA-based cryptosystems, either modifications in core RSA or applications of enhanced RSA across different domains, systematically categorizing in various categories and eventually providing findings and indications. The current study compares RSA methods based on parameters such as key generation, encryption schemes, decryption schemes, key features and enhancements, and also finds the leading areas where modified RSA has been applied in the recent past. As a result, this study will guide researchers and practitioners in understanding the past and present status of RSA cryptography along with the possibility of its applications in other domains.
Highlights
Information Technology is the backbone of today’s society in terms of day to day activities and is being utilized in almost every aspect of life
Our findings indicate that RSA variants in the domains like “Core-Modifications”, Hybrid and Parallel have the highest publication frequency and represent the most adaptable researches, and as extracted from Tables 3-12, most of such proposals improve the security by increasing the algorithm complexity (Fig 7)
As the standard RSA algorithm is a relatively slow algorithm in comparison to other popular cryptographic algorithms, there is still a vast number of opportunities needed to be explored in speeding up the algorithms, in the domains of Digital Signatures, Cloud, parallel, and wireless networks (Fig 8)
Summary
Information Technology is the backbone of today’s society in terms of day to day activities and is being utilized in almost every aspect of life. The exponential growth of the modern-day technological world is leading to the production of millions of data on a continuous basis. With such elevation, the need to keep data secure and private is increasing even more by individuals as well as organizations. Security has always been a most significant concern for the computing world in terms of transmitting information and data across the internet. Whether through the Internet, smart gadgets, or any form of transmission, the reports about data thefts and breaches seem to be growing more and more. Researchers and cryptographers are continuously working towards the innovation of various new cryptographic models along with numerous improvements of existing cryptographic algorithms in order to implement in real-world applications to improve user privacy, data security, authentication, or any other such features [1]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.