An Improved RSA Algorithm for Enhanced Security
Main Article Content
Abstract
The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the difficulty of factoring the modulus calculated by multiplying two large prime numbers. The usefulness of the RSA public key algorithm lies in using one key for encryption and another key for decryption. However, a poor choice of the keys used in encryption and decryption can affect the security of the RSA cryptosystem. Many proposals have been made to modify the RSA cryptosystem in such a way that the attacks on the RSA cryptosystem can be overcome. In this article, we propose concealing the publicly disclosed parameters, the encryption key and the common modulus of the RSA cryptosystem by altering the values sent publicly. The values sent publicly are different from the one used in the algorithm which conceals the actual parameters to others. The implementation of this idea uses two different algorithms and randomly choosing between the algorithms. The choice of the algorithm is done using a random number generator and this choice of the algorithm has to be communicated so the decrypt or uses the correct algorithm to decrypt the encrypted data. Finally we explore a faster way to implement the modular exponentiation algorithm used in the RSA encryption and decryption.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
Bakhtiari,M., & Maarof,M.A, Serious Security Weakness in RSA Cryptosystem, Int. J. of Computer Sci. Issues, Vol.9, Issue 1, No.3, January 2012.
Intila,C, Gerardo,B & Medina, R, A study of public Key “e” in RSA algorithm,https://iopscience.iop.org/article/10.1088/1757-899X/482/1/012016/pdf
Intila,C, Gerardo B & Medina, R., Modified RSA algorithm based on Key Generation, Proceedings of The IIER International Conf., Manila, Philippines, 27th -28th June 2018.
Boneh,D., Twenty years of attacks on the RSA Cryptosystem, Notices of the AMS, 203-213, 1999.
Mumtaz,M. & Ping,L., Forty years of attacks on the RSA Cryptosystem: A Survey, J. of Discrete Mathematical Sciences & Cryptography, 22(1), 9-29, 2019 [CrossRef]
Landau,S., A Brief Summary of attacks on RSA, https://www.rose-hulman.edu/class/ma/holden/Archived_Courses/Math479-0304/resources/attacks-rsa/
Abudin,J., Keot,S.K., Malakar,G., Borah,N.M., & Rahman.,M., Modified RSA Public Key Cryptosystem Using Two Key Pairs, Int. J. of Computer Sci. and Information Technologies, Vol. 5.(3), 2014. 3548-3550.
Nivetha,A., Preethy Mary S. & Santosh Kumar S., Modified RSA Encryption Keys using Four Keys, Int. J. of Engineering Research and Tech., 3(7). 2015.
Zaid,M.M.A. & Hassan,S., Lightweight RSA Algorithm Using Three Prime Numbers, Int. J. of Engineering and Tech., 7(4.36) 293-2956, 2018. [CrossRef]
Chowhan,S.S., & Jaju S.A., A Modified RSA algorithm to enhance Security for Digital Signature. In Proceedings of Int. Conf. and workshop on Computing and Communication, IEEE, Vancouver BC, Canada, 2015.
Khanum,S., Sharma,B., & Beniwal,G., Hybrid Public Key Cryptosystem combining RSA and DES algorithm, Int. J.of Innovations in Engineering and Tech., 7(3), 466-471,2016
Sarjiyus,O, Enhancing RSA Security Capability using Public Key Modification, Int. J. of Research and Scientific Innovation , 7(9), September 2020.
Sahu,J, Singh,V,Sahu,V,& Chopra,A, An enhanced Version of RSA to increase the Security, J. of Network Communication and Emerging Technologies, 7(4),April 2017
Goyal,P., & Kumar,D., Implementation for Enhancement of Computation Technique By Combining Enhanced RSA and El-Gamal Public Key Cryptosystems, Int. J. of Computer Sci. and Tech., 5(2), April-June 2014.
Obaid,T.A.S., Study A Public Key in RSA Algorithm, European J. of Engineering Research and Sci., 5(4), 2020. [CrossRef]
Abu-Dawas,M.A, & Hussain,A.K., Enhancement of RSA Scheme using Agreement Secure Information for Nearest Parameters, Int. J. of Computer and Information Technology, 4(2), March 2015.
Patidar,R.,& Bhartiya,R, Implementation of Modified RSA Cryptosystem Based on Offline Storage and Prime Number, Int. J. of Computing and Tech., 1(2), March 2014. [CrossRef]
Patel,S.R., & Shah,K., Security Enhancement and Speed Monitoring of RSA Algorithm, Int. J. of Eng. Development and Research, 2(2), 2014.
Al-Kaabi,Engr S.S, & Belhaouari, Methods Toward Enhancing RSA Algorithm: A Survey, Int, J, of Network Security and its Applications, 11 (3) May 2019. [CrossRef]
Thiziers,A.H., Theodore, H.C., Zoueu, J.T. & Michel, B., Enhanced, Modified and Secured RSA Cryptosystem based on n Prime Numbers and Offline Storage for Medical Data Transmission via Mobile Phone, Int. J. of Advanced Computer Sci. and Applications, Vol.10., No. 19, 2019[CrossRef]
Alzhrani,K.and Aljaedi,A., Windows & Linux Random Number Generation Process: A Comparative Analysis, Int. J. of Computer Applications, 113(8), 2015. [CrossRef]
Sepahvandi,S., Hosseinzadeh,M., K.Navi & A.Jalili, An improved exponentiation algorithm for RSA Cryptosystem, IEEE Int, Conf, on Research Challenges in Computer Sci., 2009. [CrossRef]