Open Access   Article Go Back

Simulation Survey of RSA and Its Variants

R. Kumar1 , A.K. Jain2

  1. Sagar Institute of Science, Technology and Engineering (SISTec-E), Bhopal, India.
  2. Sagar Institute of Science, Technology and Engineering (SISTec-E), Bhopal, India.

Correspondence should be addressed to: errajeshkumarcs@gmail.com.

Section:Survey Paper, Product Type: Journal Paper
Volume-5 , Issue-7 , Page no. 67-70, Jul-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i7.6770

Online published on Jul 30, 2017

Copyright © R. Kumar, A.K. Jain . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Kumar, A.K. Jain, “Simulation Survey of RSA and Its Variants,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.67-70, 2017.

MLA Style Citation: R. Kumar, A.K. Jain "Simulation Survey of RSA and Its Variants." International Journal of Computer Sciences and Engineering 5.7 (2017): 67-70.

APA Style Citation: R. Kumar, A.K. Jain, (2017). Simulation Survey of RSA and Its Variants. International Journal of Computer Sciences and Engineering, 5(7), 67-70.

BibTex Style Citation:
@article{Kumar_2017,
author = {R. Kumar, A.K. Jain},
title = {Simulation Survey of RSA and Its Variants},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2017},
volume = {5},
Issue = {7},
month = {7},
year = {2017},
issn = {2347-2693},
pages = {67-70},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1365},
doi = {https://doi.org/10.26438/ijcse/v5i7.6770}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i7.6770}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1365
TI - Simulation Survey of RSA and Its Variants
T2 - International Journal of Computer Sciences and Engineering
AU - R. Kumar, A.K. Jain
PY - 2017
DA - 2017/07/30
PB - IJCSE, Indore, INDIA
SP - 67-70
IS - 7
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
719 459 downloads 549 downloads
  
  
           

Abstract

Cryptography is used in securing data transmission over insecure networks. The selection of algorithm requires the condition of fulfillment of authentication, confidentiality, integrity and non-repudiation. Among all public key encryption algorithms, RSA is globally accepted encryption algorithm due to its hardness against various possible attacks. In this paper, we studied RSA, enhanced RSA, Elgamal, chinese remainder theorem (CRT) based RSA, multi-power RSA, three-prime RSA and Elgamal-RSA cryptosystem.

Key-Words / Index Term

CRT, Elgamal, Multi-prime RSA, Security, Three-prime RSA

References

[1] Sarika Khatarkar and Rachana Kamble, "Encrypted RSA Public Key Sharing By Using Image Pixel Color Value", International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.231-235, 2015.
[2] A. Menezes, P. van Oorschot and S. Vanstone, “Handbook of applied cryptography”, CRC Press, 1996.
[3] Cetin Kaya Koc, “High speed RSA implementation”, Technical Report, RSA Laboratories, California, 1994.
[4] T. Takagi., “Fast RSA-type cryptosystem modulo pkq”, In the Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO 1998), Santa Barbara, California, USA, pp.318-326, 1998.
[5] Yonghong Yang, Z. Abid and Wei Wang, “CRT-based three-prime RSA with immunity against hardware fault attack”, In the Proceedings of the 4th IEEE International Workshop on System-on-Chip for Real-Time Applications (IWSOC 2004), Banff, Alta., Canada, pp.73-76, 2004.
[6] Anand Krishnamurthy, Yiyan Tang, Cathy Xu and Yuke Wang, “An efficient implementation of multi-prime RSA on DSP processor”, In Proceedings of the 2003 IEEE lnternational Conference on Acoustics, Speech and Signal Processing (ICASSP 2003), Hong Kong, China, pp.413-416, 2003.
[7] Al-Hamami, A. H., Aldariesh, I. A., “Enhanced method for RSA cryptosystem algorithm”, In the Proceedings of IEEE Advanced Computer Science Applications and Technologies (ACSAT), Kuala Lumpur, Malaysia, pp.402-408, 2012.
[8] S. Mewada, P. Sharma and S. S. Gautam, "Exploration of efficient symmetric algorithms," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), India, pp. 663-666, 2016.
[9] Rashmi Singh and Shiv Kumar, “Elgamal’s algorithm in cryptography”, International Journal of Scientific and Engineering Research, Vol.3(12), pp.1-4, 2012.
[10] Ahmed, J. M. and Ali, Z. M, “The enhancement of computation technique by combining RSA and Elgamal cryptosystems”, In the Proceedings of IEEE Electrical Engineering and Informatics (ICEEI 2011), Bandung, Indonesia, pp.1-5, 2011.
[11] Mini Malhotra, “A new encryption scheme based on enhanced RSA and Elgamal”, International Journal of Emerging Technologies in Computational and Applied Sciences, Vol.14(336), pp.138-142, 2014.
[12] Cay S. Hostmann and Gary Cornell, “Core Java,” Volume 1-Fundamentals, Nineth Edition, Prentice Hall, USA, 2013.
[13] Cay S. Hostmann and Gary Cornell, “Core Java,” Volume 2-Advanced Features, Nineth Edition, Prentice Hall, USA, 2013.