Show simple item record

dc.contributor.authorIntila, Carlo A.
dc.contributor.authorGerardo, Bobby D.
dc.contributor.authorMedina, Ruji P.
dc.date.accessioned2024-08-28T07:22:04Z
dc.date.available2024-08-28T07:22:04Z
dc.date.issued2019-07
dc.identifier.citationIntila, C. A., Gerardo, B., & Medina, R. (2019). Modified key generation in RSA algorithm. International Journal of Recent Technology and Engineering, 8(2), 5311-5315. https://doi.org/:10.35940/ijrte.B1012.078219en
dc.identifier.issn2277-3878
dc.identifier.urihttps://hdl.handle.net/20.500.14353/643
dc.description.abstractRSA Algorithm is one of the widely used asymmetric cryptography. But with several conducts of the different studies, factorization attack based on the value of modulo ‘n’ and based on the public key, the value of the private key is vulnerable. With this, the study modified the RSA Algorithm based on modulo and the public key. The modulo transformed into a new value that produced a compound result in the factorization process. At the same time, the public key has been modified by choosing randomly from collected values and transformed to a different value making it a better-hidden private key. The two algorithms compared in terms of factorization, encryption and decryption, and speed. The modification of the RSA Algorithm based on modulo and public key produced a new two-tier scheme in terms of factorization, and encryption and decryption process. The new scheme in the result is resistant to factorization and has a new scheme of private key hiding.en
dc.language.isoenen
dc.publisherBlue Eyes Intelligence Engineering and Sciences Publicationen
dc.relation.urihttps://www.ijrte.org/wp-content/uploads/papers/v8i2/B1012078219.pdf
dc.subjectKey generationen
dc.subjectModuloen
dc.subjectPrivate keyen
dc.subjectPublic keyen
dc.subjectRSA algorithmen
dc.subjectAsymmetric cryptographyen
dc.subject.lcshDistribution modulo oneen
dc.subject.lcshPublic key cryptographyen
dc.subject.lcshCryptography
dc.subject.lcshFactorization (Mathematics)--Data processing
dc.subject.lcshData encryption (Computer science)
dc.subject.lcshCloud computing
dc.subject.lcsh
dc.subject.lcsh
dc.subject.lcsh
dc.subject.lcsh
dc.titleModified key generation in RSA algorithmen
dc.typeArticleen
dcterms.accessRightsOpen accessen
dcterms.subjectPublic key encryption
dcterms.subjectFactorization attack
dcterms.subjectDecryption
dcterms.subjectData security
dcterms.subjectCryptographic algorithms
dcterms.subjectPublic-key cryptosystem
dcterms.subject
dcterms.subject
dcterms.subject
dcterms.subject
dc.citation.journaltitleInternational Journal of Recent Technology and Engineeringen
dc.citation.volume8en
dc.citation.issue2en
dc.citation.firstpage5311en
dc.citation.lastpage5315en
dc.identifier.doi10.35940/ijrte.B1012.078219
local.isIndexedByScopusen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record