CFP last date
20 December 2024
Reseach Article

Extension of Wiener’s Approach on Security on Aadhaar Card based ATM System

by Rashmi Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 155 - Number 11
Year of Publication: 2016
Authors: Rashmi Singh
10.5120/ijca2016912440

Rashmi Singh . Extension of Wiener’s Approach on Security on Aadhaar Card based ATM System. International Journal of Computer Applications. 155, 11 ( Dec 2016), 27-33. DOI=10.5120/ijca2016912440

@article{ 10.5120/ijca2016912440,
author = { Rashmi Singh },
title = { Extension of Wiener’s Approach on Security on Aadhaar Card based ATM System },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 155 },
number = { 11 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 27-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume155/number11/26652-2016912440/ },
doi = { 10.5120/ijca2016912440 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:01:20.854724+05:30
%A Rashmi Singh
%T Extension of Wiener’s Approach on Security on Aadhaar Card based ATM System
%J International Journal of Computer Applications
%@ 0975-8887
%V 155
%N 11
%P 27-33
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is necessary for the security of the data which may in the form of text, audio and video. In general Symmetric and Asymmetric cryptographical methods are used for the above purpose. In which all types of data is converted into the binary number system. Due to non availability of the cryptographical system, hackers may have hack the data. For the strong security, various researcher have used RSA cryptosystem which is widely used in the digital signature. In the present paper, an extension of RSA cryptography is well explained for the three variables. An implementation of the proposed RSA system for three variables is demonstrated through the implementation of the Wiener’s extension. Various theorems with proof are given in the paper and implementation is given on the Aadhaar card based ATM system.

References
  1. D. Boneh, “Twenty Years of Attacks on the RSA Cryptosystem”, Notices of the American Mathematical Society (AMS), Vol. 46, No. 2, pp. 203-213, 1999.
  2. D. N. Kobliz, “A Course in Number Theory and Cryptography”, Springer-Verlag New York Berlin Heidelberg London Paris Tokyo Hong Kong Barcelona Budapest, ISBN 3-578071-8, Second Edition 1987.
  3. S. Maitra and S. Sarkar, “Revisiting Wiener’s Attack New Weak Keys in RSA”, Springer-Verlag Berlin Heidelberg, Vol. 5222, pp. 228-243, 2008.
  4. R. G. E. Pinch, “ Extending The Wiener’s Attack to RSA- Type Cryptosystem”, Electronics Letters 31 (1995), 1736-1738.
  5. B. de Weger, “Cryptanalysis of RSA with Small Prime Difference”, AAECC 13, 17–28 (2002).
  6. M. Wiener, “Cryptanalysis of Short RSA Secret exponents”, IEEE Transaction on Information Theory, Vol. 36(3), 553-558,1990.
  7. W. Stallings (1998) “Cryptography and Network Security”, Third Edition, 2006.
  8. W. Diffie and M. E. Hellman “New Directions in Cryptography”, IEEE Transaction on Information Theory, 1978.
  9. D. Bonch, G. Durfee “Cryptanalysis of RSA with private key d less than N0.292”, IEEE Transaction on Information Theory, Vol. 46, (4), 1339-1349,2000.
  10. L.A. Zadeh and J. R. Ragazzini “An Extension of Wiener’s Theory of Prediction”, Journal of Applied Physics, IEEE Xplore Vol. 21, (7), 645-655,.
  11. C.W. Shiu, Y. C. Chen and W. Hong “Encrypted image-based reversible data hiding with public key cryptography from difference expansion”, Signal processing: Image Communication, Vol. 39,226-233, 2015.
  12. Monika and S. Upadhyaya “Secure communication using DNA cryptography with secure socket layer (SSL) protocol in wireless sensor networks”, 4th International Conference on Eco-friendly computing and communication systems, Procedia computer science, 70, (2015) 808-813.
  13. K. Balasubramanian, “Variants of RSA and their cryptanalysis”, Communication and Network Technologies (ICCNT), 2014 International Conference on, Sivakasi, pp. 145-149, 2014.
  14. Chu-Hsing Lin; Jung-Chun Liu; Cheng-Chieh Li and Po-Wei Chu, "Parallel Modulus Operations in RSA Encryption by CPU/GPU Hybrid Computation," in Information Security (ASIA JCIS), 2014 Ninth Asia Joint Conference on , vol., no., pp.71-75, 3-5 Sept. 2014.
  15. Hung-Min Sun; Mu-En Wu; Wei-Chi Ting; Hinek, M.J., "Dual RSA and Its Security Analysis," in Information Theory, IEEE Transactions on, vol.53, no.8, pp.2922-2933, Aug. 2007.
  16. R. C. Das, P. P. Purohit, T. Alam and M. Chowdhury, "Location based ATM locator system using OpenStreetMap," Software, Knowledge, Information Management and Applications (SKIMA), 2014 8th International Conference on, Dhaka, ,pp. 1-6, 2014.
  17. M. Antony, R. Aswathy and K. H. Keerthana, "3G ATM," Current Trends in Engineering and Technology (ICCTET), 2013 International Conference on, Coimbatore, pp. 421-423, 2013,.
  18. Roy A. and Karforma S., “A survey on Digital Signatures and its Applications”. J. of Comp. and I.T. Vol. 3(1and2), 45-69 ,2012.
  19. Hinek M. J., Low, M. K., Taske, E., “On Some Attacks on Multi-prime RSA”, proceeding in SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in cryptography, pp. 385-404, 2002.
  20. P.A. kameswari, L. Jyotsana, “Extending Wiener’s Extension to RSA-Like Cryptosystems over Elliptic Curves”, British Journal of Mathematics & Computer Science, Vol. 14, pp. 1-8, 2016.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Digital Signature Hackers Symmetric Asymmetric