RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complex...RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complexity, compared with either multiplication in common sense or modular multiplication over finite field. In order to improve the performance of key generation, we propose a batch private keys generation method in this paper. The method derives efficiency from cutting down multiplicative inversions over finite field. Theoretical analysis shows that the speed of batch private keys generation for s users is faster than that of s times solo private key generation. It is suitable for applications in those systems with large amount of users.展开更多
As an outstanding asymmetric cryptography, RSA algorithm has a lot of virtues and thus is well applied in the scope of IC card applications. The paper deals with the application of RSA in smart cards and the approach ...As an outstanding asymmetric cryptography, RSA algorithm has a lot of virtues and thus is well applied in the scope of IC card applications. The paper deals with the application of RSA in smart cards and the approach in which the modular exponentiation of huge number is simplified by using the Chinese Remainder Theorem. We have already succeeded in completing RSA in IC cards. Results indicate that RSA algorithm applied in IC cards has the equivalent speed of DES algorithm with the same environment.展开更多
This work is the first to determine that a real quantum computer(including generalized and specialized)can decipher million-scale RSA relying solely on quantum algorithms,showing the real attack potential of D-Wave ma...This work is the first to determine that a real quantum computer(including generalized and specialized)can decipher million-scale RSA relying solely on quantum algorithms,showing the real attack potential of D-Wave machines.The influence of different column widths on RSA factorization results is studied on the basis of a multiplication table,and the optimal column method is determined by traversal experiments.The traversal experiment of integer factorization within 10000 shows that the local field and coupling coefficients are 75%–93%lower than the research of Shanghai University in 2020 and more than 85%lower than that of Purdue University in 2018.Extremely low Ising model parameters are crucial to reducing the hardware requirements,prompting factoring 1245407 on the D-Wave 2000Q real machine.D-Wave advantage already has more than 5000 qubits and will be expanded to 7000 qubits during 2023–2024,with remarkable improvements in decoherence and topology.This machine is expected to promote the solution of large-scale combinatorial optimization problems.One of the contributions of this paper is the discussion of the long-term impact of D-Wave on the development of post-quantum cryptography standards.展开更多
Cloud computing has become ubiquitous in our daily lives in recent years.Data are the source of technology that is generated hugely by various sources.Big data is dealing with huge data volumes or complex data.The maj...Cloud computing has become ubiquitous in our daily lives in recent years.Data are the source of technology that is generated hugely by various sources.Big data is dealing with huge data volumes or complex data.The major concern in big data is security threats.Security concerns create a negative impact on the user on the aspect of trust.In big data still,security threats exist as com-monly known as DDOS(Distributed-Denial-of-Service)attacks,data loss,Inade-quate Data Backups,System Vulnerabilities,and Phishing as well as Social Engineering Attacks.In our work,we have taken the data loss and Inadequate Data Backups issues into consideration.We analyze that RSA(Rivest,Shamir,&Adleman)is the most secure cryptography mechanism.In cloud computing,user authentication is the weaker section to be secured.Generally,the cryptogra-phy mechanism is done in the authentication section only.We implemented our new idea of registration with selected images and pins for processing RSA.By valid authentication approval earned by the proposed mechanism,the user is allowed to use the cloud database,encryption,decryption,etc.To prove the effi-ciency level of our proposed system,a comparison work is conducted between DSSE(Digital Signature Standard Encryption)and EFSSA(Efficient framework for securely sharing afile using asymmetric key distribution management).The experimental work is carried out and the performance evaluation is done using encryption time and decryption time analysis,throughput,and processing time.On this observation,the security level attained by ERSA is far better in compar-ison to DSSE and EFSSA with the maximum throughput attained by the proposed E-RSA being 500 Mb/Min and encryption time of 3.2 s,thus ensuring the user trust in using the cloud environment.展开更多
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s...Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.展开更多
基金Supported by National Laboratory for Modern Communications Foundation (No. 5143 6010404DZ0235)
文摘RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complexity, compared with either multiplication in common sense or modular multiplication over finite field. In order to improve the performance of key generation, we propose a batch private keys generation method in this paper. The method derives efficiency from cutting down multiplicative inversions over finite field. Theoretical analysis shows that the speed of batch private keys generation for s users is faster than that of s times solo private key generation. It is suitable for applications in those systems with large amount of users.
文摘As an outstanding asymmetric cryptography, RSA algorithm has a lot of virtues and thus is well applied in the scope of IC card applications. The paper deals with the application of RSA in smart cards and the approach in which the modular exponentiation of huge number is simplified by using the Chinese Remainder Theorem. We have already succeeded in completing RSA in IC cards. Results indicate that RSA algorithm applied in IC cards has the equivalent speed of DES algorithm with the same environment.
基金supported by the Special Zone Project of National Defense Innovation.
文摘This work is the first to determine that a real quantum computer(including generalized and specialized)can decipher million-scale RSA relying solely on quantum algorithms,showing the real attack potential of D-Wave machines.The influence of different column widths on RSA factorization results is studied on the basis of a multiplication table,and the optimal column method is determined by traversal experiments.The traversal experiment of integer factorization within 10000 shows that the local field and coupling coefficients are 75%–93%lower than the research of Shanghai University in 2020 and more than 85%lower than that of Purdue University in 2018.Extremely low Ising model parameters are crucial to reducing the hardware requirements,prompting factoring 1245407 on the D-Wave 2000Q real machine.D-Wave advantage already has more than 5000 qubits and will be expanded to 7000 qubits during 2023–2024,with remarkable improvements in decoherence and topology.This machine is expected to promote the solution of large-scale combinatorial optimization problems.One of the contributions of this paper is the discussion of the long-term impact of D-Wave on the development of post-quantum cryptography standards.
文摘Cloud computing has become ubiquitous in our daily lives in recent years.Data are the source of technology that is generated hugely by various sources.Big data is dealing with huge data volumes or complex data.The major concern in big data is security threats.Security concerns create a negative impact on the user on the aspect of trust.In big data still,security threats exist as com-monly known as DDOS(Distributed-Denial-of-Service)attacks,data loss,Inade-quate Data Backups,System Vulnerabilities,and Phishing as well as Social Engineering Attacks.In our work,we have taken the data loss and Inadequate Data Backups issues into consideration.We analyze that RSA(Rivest,Shamir,&Adleman)is the most secure cryptography mechanism.In cloud computing,user authentication is the weaker section to be secured.Generally,the cryptogra-phy mechanism is done in the authentication section only.We implemented our new idea of registration with selected images and pins for processing RSA.By valid authentication approval earned by the proposed mechanism,the user is allowed to use the cloud database,encryption,decryption,etc.To prove the effi-ciency level of our proposed system,a comparison work is conducted between DSSE(Digital Signature Standard Encryption)and EFSSA(Efficient framework for securely sharing afile using asymmetric key distribution management).The experimental work is carried out and the performance evaluation is done using encryption time and decryption time analysis,throughput,and processing time.On this observation,the security level attained by ERSA is far better in compar-ison to DSSE and EFSSA with the maximum throughput attained by the proposed E-RSA being 500 Mb/Min and encryption time of 3.2 s,thus ensuring the user trust in using the cloud environment.
文摘Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.