WIRED++WVSU Institutional Repository and Electronic Dissertation and Theses PLUS
    • English
    • Filipino
    • Deutsch
    • русский
  • Deutsch 
    • English
    • Filipino
    • Deutsch
    • русский
  • Einloggen
Dokumentanzeige 
  •   DSpace Startseite
  • WVSU External Publications
  • Journal articles published externally
  • Dokumentanzeige
  •   DSpace Startseite
  • WVSU External Publications
  • Journal articles published externally
  • Dokumentanzeige
JavaScript is disabled for your browser. Some features of this site may not work without it.

Modified key generation in RSA algorithm

Thumbnail
Associated content
www.ijrte.org
Datum
2019-07
Autor
Intila, Carlo A.
Gerardo, Bobby D. ORCID
Medina, Ruji P. ORCID
Metadata
Zur Langanzeige


Share 
 
Zusammenfassung
RSA Algorithm is one of the widely used asymmetric cryptography. But with several conducts of the different studies, factorization attack based on the value of modulo ‘n’ and based on the public key, the value of the private key is vulnerable. With this, the study modified the RSA Algorithm based on modulo and the public key. The modulo transformed into a new value that produced a compound result in the factorization process. At the same time, the public key has been modified by choosing randomly from collected values and transformed to a different value making it a better-hidden private key. The two algorithms compared in terms of factorization, encryption and decryption, and speed. The modification of the RSA Algorithm based on modulo and public key produced a new two-tier scheme in terms of factorization, and encryption and decryption process. The new scheme in the result is resistant to factorization and has a new scheme of private key hiding.
URI
https://hdl.handle.net/20.500.14353/643
Recommended Citation
Intila, C. A., Gerardo, B. D., & Medina, R. P. (2019). Modified key generation in RSA algorithm. International Journal of Recent Technology and Engineering, 8(2), 5311-5315.
DOI
10.35940/ijrte.B1012.078219
Type
Article
ISSN
2277-3878
Keywords
Key generation Modulo Private key Public key RSA algorithm Asymmetric cryptography Public key encryption Factorization attack Decryption Data security Cryptographic algorithms Public-key cryptosystem
Schlagwort
Distribution modulo one OCLC - FAST (Faceted Application of Subject Terminology) Public key cryptography OCLC - FAST (Faceted Application of Subject Terminology) Cryptography OCLC - FAST (Faceted Application of Subject Terminology) Factorization (Mathematics)--Data processing OCLC - FAST (Faceted Application of Subject Terminology) Data encryption (Computer science) OCLC - FAST (Faceted Application of Subject Terminology) Cloud computing OCLC - FAST (Faceted Application of Subject Terminology)
Collections
  • Journal articles published externally [121]

© 2025 University Learning Resource Center | WVSU
Kontakt | Feedback abschicken
 

 

Stöbern

Gesamter BestandBereiche & SammlungenErscheinungsdatumAutorenTitelnSchlagwortenDiese SammlungErscheinungsdatumAutorenTitelnSchlagworten

Mein Benutzerkonto

EinloggenRegistrieren

Statistik

Benutzungsstatistik

© 2025 University Learning Resource Center | WVSU
Kontakt | Feedback abschicken
 

 

EXTERNAL LINKS DISCLAIMER

This link is being provided as a convenience and for informational purposes only. West Visayas State University bears no responsibility for the accuracy, legality or content of the external site or for that of subsequent links. Contact the external site for answers to questions regarding its content.

If you come across any external links that don't work, we would be grateful if you could report them to the repository administrators.

Click DOWNLOAD to open/view the file. Chat Graciano to inform us in case the link we provided don't work.

Download