WIRED++WVSU Institutional Repository and Electronic Dissertation and Theses PLUS
    • English
    • Filipino
    • Deutsch
    • русский
  • English 
    • English
    • Filipino
    • Deutsch
    • русский
  • Login
View Item 
  •   WIRED++ Home
  • WVSU External Publications
  • Journal articles published externally
  • View Item
  •   WIRED++ Home
  • WVSU External Publications
  • Journal articles published externally
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Modified key generation in RSA algorithm

Thumbnail
Associated content
www.ijrte.org
Date
2019-07
Author
Intila, Carlo A.
Gerardo, Bobby D. ORCID
Medina, Ruji P. ORCID
Metadata
Show full item record


Share 
 
Abstract
RSA Algorithm is one of the widely used asymmetric cryptography. But with several conducts of the different studies, factorization attack based on the value of modulo ‘n’ and based on the public key, the value of the private key is vulnerable. With this, the study modified the RSA Algorithm based on modulo and the public key. The modulo transformed into a new value that produced a compound result in the factorization process. At the same time, the public key has been modified by choosing randomly from collected values and transformed to a different value making it a better-hidden private key. The two algorithms compared in terms of factorization, encryption and decryption, and speed. The modification of the RSA Algorithm based on modulo and public key produced a new two-tier scheme in terms of factorization, and encryption and decryption process. The new scheme in the result is resistant to factorization and has a new scheme of private key hiding.
URI
https://hdl.handle.net/20.500.14353/643
Recommended Citation
Intila, C. A., Gerardo, B. D., & Medina, R. P. (2019). Modified key generation in RSA algorithm. International Journal of Recent Technology and Engineering, 8(2), 5311-5315.
DOI
10.35940/ijrte.B1012.078219
Type
Article
ISSN
2277-3878
Keywords
Key generation Modulo Private key Public key RSA algorithm Asymmetric cryptography Public key encryption Factorization attack Decryption Data security Cryptographic algorithms Public-key cryptosystem
Subject
Distribution modulo one OCLC - FAST (Faceted Application of Subject Terminology) Public key cryptography OCLC - FAST (Faceted Application of Subject Terminology) Cryptography OCLC - FAST (Faceted Application of Subject Terminology) Factorization (Mathematics)--Data processing OCLC - FAST (Faceted Application of Subject Terminology) Data encryption (Computer science) OCLC - FAST (Faceted Application of Subject Terminology) Cloud computing OCLC - FAST (Faceted Application of Subject Terminology)
Collections
  • Journal articles published externally [121]

© 2025 University Learning Resource Center | WVSU
Contact Us | Send Feedback
 

 

Browse

All of WIRED++Communities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister

Statistics

View Usage Statistics

© 2025 University Learning Resource Center | WVSU
Contact Us | Send Feedback
 

 

EXTERNAL LINKS DISCLAIMER

This link is being provided as a convenience and for informational purposes only. West Visayas State University bears no responsibility for the accuracy, legality or content of the external site or for that of subsequent links. Contact the external site for answers to questions regarding its content.

If you come across any external links that don't work, we would be grateful if you could report them to the repository administrators.

Click DOWNLOAD to open/view the file. Chat Graciano to inform us in case the link we provided don't work.

Download