Modified key generation in RSA algorithm
dc.contributor.author | Intila, Carlo A. | |
dc.contributor.author | Gerardo, Bobby D. | |
dc.contributor.author | Medina, Ruji P. | |
dc.date.accessioned | 2024-08-28T07:22:04Z | |
dc.date.available | 2024-08-28T07:22:04Z | |
dc.date.issued | 2019-07 | |
dc.identifier.citation | Intila, C. A., Gerardo, B., & Medina, R. (2019). Modified key generation in RSA algorithm. International Journal of Recent Technology and Engineering, 8(2), 5311-5315. https://doi.org/:10.35940/ijrte.B1012.078219 | en |
dc.identifier.issn | 2277-3878 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14353/643 | |
dc.description.abstract | RSA Algorithm is one of the widely used asymmetric cryptography. But with several conducts of the different studies, factorization attack based on the value of modulo ‘n’ and based on the public key, the value of the private key is vulnerable. With this, the study modified the RSA Algorithm based on modulo and the public key. The modulo transformed into a new value that produced a compound result in the factorization process. At the same time, the public key has been modified by choosing randomly from collected values and transformed to a different value making it a better-hidden private key. The two algorithms compared in terms of factorization, encryption and decryption, and speed. The modification of the RSA Algorithm based on modulo and public key produced a new two-tier scheme in terms of factorization, and encryption and decryption process. The new scheme in the result is resistant to factorization and has a new scheme of private key hiding. | en |
dc.language.iso | en | en |
dc.publisher | Blue Eyes Intelligence Engineering and Sciences Publication | en |
dc.relation.uri | https://www.ijrte.org/wp-content/uploads/papers/v8i2/B1012078219.pdf | |
dc.subject | Key generation | en |
dc.subject | Modulo | en |
dc.subject | Private key | en |
dc.subject | Public key | en |
dc.subject | RSA algorithm | en |
dc.subject | Asymmetric cryptography | en |
dc.subject.lcsh | Distribution modulo one | en |
dc.subject.lcsh | Public key cryptography | en |
dc.subject.lcsh | Cryptography | |
dc.subject.lcsh | Factorization (Mathematics)--Data processing | |
dc.subject.lcsh | Data encryption (Computer science) | |
dc.subject.lcsh | Cloud computing | |
dc.subject.lcsh | ||
dc.subject.lcsh | ||
dc.subject.lcsh | ||
dc.subject.lcsh | ||
dc.title | Modified key generation in RSA algorithm | en |
dc.type | Article | en |
dcterms.accessRights | Open access | en |
dcterms.subject | Public key encryption | |
dcterms.subject | Factorization attack | |
dcterms.subject | Decryption | |
dcterms.subject | Data security | |
dcterms.subject | Cryptographic algorithms | |
dcterms.subject | Public-key cryptosystem | |
dcterms.subject | ||
dcterms.subject | ||
dcterms.subject | ||
dcterms.subject | ||
dc.citation.journaltitle | International Journal of Recent Technology and Engineering | en |
dc.citation.volume | 8 | en |
dc.citation.issue | 2 | en |
dc.citation.firstpage | 5311 | en |
dc.citation.lastpage | 5315 | en |
dc.identifier.doi | 10.35940/ijrte.B1012.078219 | |
local.isIndexedBy | Scopus | en |
Files in this item
This item appears in the following Collection(s)
-
Journal articles published externally [113]
Journal articles published externally, written by WVSU faculty members, staff, and students