An Improved RSA Algorithm for Enhanced Security

Main Article Content

Dr. Kannan Balasubramanian
M. Arun
Dr. K. R. Sekar

Abstract

The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the difficulty of factoring the modulus calculated by multiplying two large prime numbers. The usefulness of the RSA public key algorithm lies in using one key for encryption and another key for decryption. However, a poor choice of the keys used in encryption and decryption can affect the security of the RSA cryptosystem. Many proposals have been made to modify the RSA cryptosystem in such a way that the attacks on the RSA cryptosystem can be overcome. In this article, we propose concealing the publicly disclosed parameters, the encryption key and the common modulus of the RSA cryptosystem by altering the values sent publicly. The values sent publicly are different from the one used in the algorithm which conceals the actual parameters to others. The implementation of this idea uses two different algorithms and randomly choosing between the algorithms. The choice of the algorithm is done using a random number generator and this choice of the algorithm has to be communicated so the decrypt or uses the correct algorithm to decrypt the encrypted data. Finally we explore a faster way to implement the modular exponentiation algorithm used in the RSA encryption and decryption.

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
Dr. Kannan Balasubramanian, M. Arun, and Dr. K. R. Sekar , Trans., “An Improved RSA Algorithm for Enhanced Security”, IJCNS, vol. 2, no. 2, pp. 1–4, Jan. 2024, doi: 10.54105/.
Section
Articles
Author Biography

M. Arun, Associate Professor, Department of Computer Science and Engineering, Veltech Rangarajan Dr. Sagunthala R& D Institute of Science and Technology (Deemed to be University), Chennai. (Tamil Nadu), India.

How to Cite

[1]
Dr. Kannan Balasubramanian, M. Arun, and Dr. K. R. Sekar , Trans., “An Improved RSA Algorithm for Enhanced Security”, IJCNS, vol. 2, no. 2, pp. 1–4, Jan. 2024, doi: 10.54105/.
Share |

References

Bakhtiari,M., & Maarof,M.A, Serious Security Weakness in RSA Cryptosystem, Int. J. of Computer Sci. Issues, Vol.9, Issue 1, No.3, January 2012.

Intila,C, Gerardo,B & Medina, R, A study of public Key “e” in RSA algorithm,https://iopscience.iop.org/article/10.1088/1757-899X/482/1/012016/pdf

Intila,C, Gerardo B & Medina, R., Modified RSA algorithm based on Key Generation, Proceedings of The IIER International Conf., Manila, Philippines, 27th -28th June 2018.

Boneh,D., Twenty years of attacks on the RSA Cryptosystem, Notices of the AMS, 203-213, 1999.

Mumtaz,M. & Ping,L., Forty years of attacks on the RSA Cryptosystem: A Survey, J. of Discrete Mathematical Sciences & Cryptography, 22(1), 9-29, 2019 [CrossRef]

Landau,S., A Brief Summary of attacks on RSA, https://www.rose-hulman.edu/class/ma/holden/Archived_Courses/Math479-0304/resources/attacks-rsa/

Abudin,J., Keot,S.K., Malakar,G., Borah,N.M., & Rahman.,M., Modified RSA Public Key Cryptosystem Using Two Key Pairs, Int. J. of Computer Sci. and Information Technologies, Vol. 5.(3), 2014. 3548-3550.

Nivetha,A., Preethy Mary S. & Santosh Kumar S., Modified RSA Encryption Keys using Four Keys, Int. J. of Engineering Research and Tech., 3(7). 2015.

Zaid,M.M.A. & Hassan,S., Lightweight RSA Algorithm Using Three Prime Numbers, Int. J. of Engineering and Tech., 7(4.36) 293-2956, 2018. [CrossRef]

Chowhan,S.S., & Jaju S.A., A Modified RSA algorithm to enhance Security for Digital Signature. In Proceedings of Int. Conf. and workshop on Computing and Communication, IEEE, Vancouver BC, Canada, 2015.

Khanum,S., Sharma,B., & Beniwal,G., Hybrid Public Key Cryptosystem combining RSA and DES algorithm, Int. J.of Innovations in Engineering and Tech., 7(3), 466-471,2016

Sarjiyus,O, Enhancing RSA Security Capability using Public Key Modification, Int. J. of Research and Scientific Innovation , 7(9), September 2020.

Sahu,J, Singh,V,Sahu,V,& Chopra,A, An enhanced Version of RSA to increase the Security, J. of Network Communication and Emerging Technologies, 7(4),April 2017

Goyal,P., & Kumar,D., Implementation for Enhancement of Computation Technique By Combining Enhanced RSA and El-Gamal Public Key Cryptosystems, Int. J. of Computer Sci. and Tech., 5(2), April-June 2014.

Obaid,T.A.S., Study A Public Key in RSA Algorithm, European J. of Engineering Research and Sci., 5(4), 2020. [CrossRef]

Abu-Dawas,M.A, & Hussain,A.K., Enhancement of RSA Scheme using Agreement Secure Information for Nearest Parameters, Int. J. of Computer and Information Technology, 4(2), March 2015.

Patidar,R.,& Bhartiya,R, Implementation of Modified RSA Cryptosystem Based on Offline Storage and Prime Number, Int. J. of Computing and Tech., 1(2), March 2014. [CrossRef]

Patel,S.R., & Shah,K., Security Enhancement and Speed Monitoring of RSA Algorithm, Int. J. of Eng. Development and Research, 2(2), 2014.

Al-Kaabi,Engr S.S, & Belhaouari, Methods Toward Enhancing RSA Algorithm: A Survey, Int, J, of Network Security and its Applications, 11 (3) May 2019. [CrossRef]

Thiziers,A.H., Theodore, H.C., Zoueu, J.T. & Michel, B., Enhanced, Modified and Secured RSA Cryptosystem based on n Prime Numbers and Offline Storage for Medical Data Transmission via Mobile Phone, Int. J. of Advanced Computer Sci. and Applications, Vol.10., No. 19, 2019[CrossRef]

Alzhrani,K.and Aljaedi,A., Windows & Linux Random Number Generation Process: A Comparative Analysis, Int. J. of Computer Applications, 113(8), 2015. [CrossRef]

Sepahvandi,S., Hosseinzadeh,M., K.Navi & A.Jalili, An improved exponentiation algorithm for RSA Cryptosystem, IEEE Int, Conf, on Research Challenges in Computer Sci., 2009. [CrossRef]