期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers
1
作者 Muhammad Ariful Islam Md. Ashraful Islam +1 位作者 Nazrul Islam Boishakhi Shabnam 《Journal of Computer and Communications》 2018年第3期78-90,共13页
Cryptography is the study that provides security service. It concerns with confidentiality, integrity, and authentication. Public key cryptography provides an enormous revolution in the field of the cryptosystem. It u... Cryptography is the study that provides security service. It concerns with confidentiality, integrity, and authentication. Public key cryptography provides an enormous revolution in the field of the cryptosystem. It uses two different keys where keys are related in such a way that, the public key can use to encrypt the message and private key can be used to decrypt the message. This paper proposed an enhanced and modified approach of RSA cryptosystem based on “n” distinct prime number. This existence of “n” prime number increases the difficulty of the factoring of the variable “N” which increases the complexity of the algorithm. In this approach, two different public key and private key generated from the large factor of the variable “N” and perform a double encryption-decryption operation which affords more security. Experiment on a set of a random number provided that the key generation time, analysis of variable “N”, encryption and decryption will take a long time compared to traditional RSA. Thus, this approach is more efficient, highly secured and not easily breakable. 展开更多
关键词 rsa Algorithm ENCRYPTION DECRYPTION cryptosystem Security PUBLIC key PRIVATE key
下载PDF
Batch Private Keys Generation for RSA in Security Communication Systems 被引量:1
2
作者 陈运 陈新 《Journal of Electronic Science and Technology of China》 2005年第1期22-26,共5页
RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complex... RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complexity, compared with either multiplication in common sense or modular multiplication over finite field. In order to improve the performance of key generation, we propose a batch private keys generation method in this paper. The method derives efficiency from cutting down multiplicative inversions over finite field. Theoretical analysis shows that the speed of batch private keys generation for s users is faster than that of s times solo private key generation. It is suitable for applications in those systems with large amount of users. 展开更多
关键词 information security system public key cryptosystem rsa key generation
下载PDF
New Weak Keys in RSA
3
作者 WANG Baocang LIU Shuanggen HU Yupu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1529-1532,共4页
The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by... The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown thai the RSA number n = pq can be easily factored if p and q have the special form of p = as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q). 展开更多
关键词 integer factorization rsa number public key cryptosystem special-purpose algorithm
下载PDF
A threshold key escrow scheme based on public key cryptosystem 被引量:16
4
作者 曹珍富 《Science China(Technological Sciences)》 SCIE EI CAS 2001年第4期441-448,共8页
In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no... In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no better than that of directly using threshold cryptography. In this paper, we present a common pattern of threshold key escrow scheme based on public key cryptosystem, and a detailed design based on the improved RSA algorithm is given. The above problem is solved by this scheme. 展开更多
关键词 key escrow scheme threshold cryptography public key cryptosystem improved rsa cryptosystem LEAF
原文传递
AN IMPROVED SMM ALGORITHM 被引量:1
5
作者 Chen Yun(UEST of China, Chengdu 610054) 《Journal of Electronics(China)》 1999年第1期93-96,共4页
A new fast algorithm to compute modular exponentiation for very large integers is proposed in this paper, which is an improvement of the fast RSA algorithm based on Symmetry of Modular Multiplication(SMM). The SMM alg... A new fast algorithm to compute modular exponentiation for very large integers is proposed in this paper, which is an improvement of the fast RSA algorithm based on Symmetry of Modular Multiplication(SMM). The SMM algorithm obtains the speed improvement by conditional substitution on every basic operation to decrease the absolute value of product and the operation numbers of modular reductions. The proposed algorithm can get faster operation speed by decreasing the numbers of basic operations. Compared to conventional binary representation, a speed improvement of approximately 47.5% would be expected using the proposed algorithm. 展开更多
关键词 CRYPTOLOGY PUBLIC key cryptosystem rsa MODULAR EXPONENTIATION
下载PDF
A PRACTICAL PARALLEL ALGORITHM FOR COMPUTING a^b mod c
6
作者 DAI DAWEI and HUANG JINGWEI(Dept. of Computer Science, Wuhan University, 430072, P.R.China Dept. of Computer Science and Tcchnology, Wuhan University of Hydraulic and Electric Engineering .130072, P.R.China) 《Wuhan University Journal of Natural Sciences》 CAS 1996年第Z1期446-449,共4页
In this paper,we propose a. practical parallel algorithm for computing ab mod c. The algorithm is based on RES representations of integers. In particular, a technique is introduced for avoiding overflow.The algorithm ... In this paper,we propose a. practical parallel algorithm for computing ab mod c. The algorithm is based on RES representations of integers. In particular, a technique is introduced for avoiding overflow.The algorithm is easy to be implemented on hardware and achieves linear speedup. 展开更多
关键词 Public key cryptosystem rsa cryptosystem RNS representation.
下载PDF
Faster Method for Secure Transmission of Information with Sender Identification
7
作者 Boris Verkhovsky 《International Journal of Communications, Network and System Sciences》 2013年第2期77-81,共5页
This paper describes an algorithm for secure transmission of information via open communication channels based on the discrete logarithm problem. The proposed algorithm also provides sender identification (digital sig... This paper describes an algorithm for secure transmission of information via open communication channels based on the discrete logarithm problem. The proposed algorithm also provides sender identification (digital signature). It is twice as fast as the RSA algorithm and requires fifty per cent fewer exponentiations than the ElGamal cryptosystems. In addition, the algorithm requires twice less bandwidth than the ElGamal algorithm. Numerical examples illustrate all steps of the proposed algorithm: system design (selection of private and public keys), encryption, transmission of information, decryption and information recovery. 展开更多
关键词 Digital Signature rsa Algorithm DIFFIE-HELLMAN key Exchange ELGAMAL cryptosystem ENCRYPTOR Discrete LOGARITHM SENDER IDENTIFICATION Multiplicative Inverse
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部