Secure RSA variant system to avoid factorization attack using phony modules and phony public key exponent

6Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In cryptography Public key cryptography plays a significant job in the field of data communication. Public key uses two distinctive keys where keys are related so those, the public key can use to encode the information and private key is utilized to decode. RSA is considered as one of the effective algorithm in public key cryptography. Effectiveness of RSA Algorithm for the most part relies upon how adequately public key segments is shared i.e. common modulus n and public key exponent e. If these components compromised by the hacker using mathematical attacks, acquiring private key becomes easier task for the intruder. This paper present an upgraded RSA algorithm which is used to avoid the limitations of Integer factorization attack by improving the complexity of factorization process by utilizing fake/phony public key exponent type f rather than e and phony modulus X rather than n. Paper also gives comparative analysis of the proposed work using standard metrics.

Cite

CITATION STYLE

APA

Raghunandan, K. R., Aithal, G., & Shetty, S. (2019). Secure RSA variant system to avoid factorization attack using phony modules and phony public key exponent. International Journal of Innovative Technology and Exploring Engineering, 8(9), 1065–1070. https://doi.org/10.35940/ijitee.i7807.078919

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free