CFP last date
20 January 2025
Reseach Article

A Survey and Performance Analysis of Various RSA based Encryption Techniques

by Sarika Khatarkar, Rachana Kamble
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 114 - Number 7
Year of Publication: 2015
Authors: Sarika Khatarkar, Rachana Kamble
10.5120/19993-1736

Sarika Khatarkar, Rachana Kamble . A Survey and Performance Analysis of Various RSA based Encryption Techniques. International Journal of Computer Applications. 114, 7 ( March 2015), 30-33. DOI=10.5120/19993-1736

@article{ 10.5120/19993-1736,
author = { Sarika Khatarkar, Rachana Kamble },
title = { A Survey and Performance Analysis of Various RSA based Encryption Techniques },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 114 },
number = { 7 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 30-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume114/number7/19993-1736/ },
doi = { 10.5120/19993-1736 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:52:07.504422+05:30
%A Sarika Khatarkar
%A Rachana Kamble
%T A Survey and Performance Analysis of Various RSA based Encryption Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 114
%N 7
%P 30-33
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Network and Internet applications are growing very fast, since the need to secure these applications are very fast. So the importance and the value of the swapped data by the internet and other media types are increasing. The protection of multimedia data, sensitive information like credit cards, banking transactions and social security numbers is becoming very important. For secure transmission of data in open network, encryption is very important methodology. In recent years many encryption methods have been proposed and used to protect confidential information. In this survey paper many different asymmetric cryptography techniques, like RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm) are analyzed. Also discussed many other efficient algorithms.

References
  1. Amare Anagaw Ayele, Dr. Vuda Sreenivasarao, June 2013, "A Modified RSA Encryption Technique Based on Multiple public keys", International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 4.
  2. Liang Wang, Yonggui Zhang, 2011, "A New Personal Information Protection Approach Based on RSA Cryptography", IEEE.
  3. Ammar Odeh, Khaled Elleithy, Muneer Alshowkan, Eman Abdelfattah, 2013, "Quantum Key Distribution by Using Public Key Algorithm(RSA)", IEEE.
  4. Norhidayah Muhammadi, Jasni Mohamad Zaini, Md Yazid Mohd Saman, "Loop-based RSA Key Generation Algorithm using String Identity", 13th International Conference on Control, Automation and Systems (ICCAS 2013).
  5. Ms. Ritu Patidar, Mrs. Rupali Bhartiya, 2013, "Modified RSA Cryptosystem Based on Offline Storage and Prime Number", IEEE.
  6. Malek Jakob Kakish, "Enhancing The Security Of The Rsa Cryptosystem", Ijrras August 2011.
  7. KetuFile White Papers "Symmetric vs. Asymmetric Encryption ", a division of Midwest research corporation.
  8. RSA Laboratories : Technical Notes and Papers.
  9. A fast implementation of the RSA algorithm using the GNU MP library. By Rajorshi Biswas,Shibdas Bandyopadhyay,Anirban Banerjee, IIIT – Calcutta.
  10. Sensitivity of Changing the RSA Parameters on the Complexity and Performance of the Algorithm By Allam Mousa ;Journal of Applied Science 5 (1) :60-63,2005 ISSN 1607 – 8926. Asian Network for Scientific Information.
Index Terms

Computer Science
Information Sciences

Keywords

RSA i-RSA