CFP last date
20 December 2024
Reseach Article

Enhanced Public Key Algorithm for Improved Security

by Dilpreet Singh, Trilok C. Aseri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 21
Year of Publication: 2012
Authors: Dilpreet Singh, Trilok C. Aseri
10.5120/7894-1214

Dilpreet Singh, Trilok C. Aseri . Enhanced Public Key Algorithm for Improved Security. International Journal of Computer Applications. 49, 21 ( July 2012), 14-19. DOI=10.5120/7894-1214

@article{ 10.5120/7894-1214,
author = { Dilpreet Singh, Trilok C. Aseri },
title = { Enhanced Public Key Algorithm for Improved Security },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 21 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 14-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number21/7894-1214/ },
doi = { 10.5120/7894-1214 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:46:48.558937+05:30
%A Dilpreet Singh
%A Trilok C. Aseri
%T Enhanced Public Key Algorithm for Improved Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 21
%P 14-19
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The area of security has become more important to personal computer users, organizations, and the military due to the continuous advancements in technology and computing resources. With the advent of Internet and ease of data sharing among users, the integrity of the data has become quite an issue. Moreover, with better computational resources the number of threats also increases. This further pushes for a stronger and better security measures. The entire field of security is vast and in an evolutionary stage. In this paper, we have re-engineered a well known and widely used public-key algorithm of Diffie-Hellman. The paper also provides an insight into other public-key algorithm. In our work, we have proposed some amendments in DH so as to improve the secret key values. Experimental results show that our proposed amendments in DH give significant improvements.

References
  1. Crowley, E. 2003. Information system security curricula development. In Proceedings of the 4th conference on Information technology curriculum.
  2. H. Vartiainena, "Simple Model Of Secure Public Communication", Theory and Decision, 2009.
  3. S. Kim, G. Lee, "Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment", Future Generation Computer Systems, 2009.
  4. Pfleeger, C. 2006 Security in Computing. Prentice Hall.
  5. Bishop, M. 2005 Introduction to Computer Security. Addison-Wesley Professional.
  6. Tarte, J. 2003 The Need for Information Security in Today's Economy. Infosec Reading Room. Sans Institute.
  7. F. Leprevost, F. 2005. Public-Key Cryptography: An Overview of some Algorithms. In Optical and Digital Techniques for Information Security, B. Javidi
  8. Wang, J. 2009. Public-Key Cryptography and Key Management. In Computer Network Security: Theory and Practice, J. Wang
  9. Salomon, D. 2005. Public-Key Cryptography. In Coding for Data and Computer Communications, D. Salomon
  10. Raskind, W. and Blum, E. K. 2011. Computer Security and Public Key Cryptography. In Computer Science: The Hardware, Software and Heart of It, E. K. Blum, A. V. Aho
  11. M. Nikodem, "DSA Signature Scheme Immune to the Fault Cryptanalysis", Lecture Notes in Computer Science, 2008.
  12. Z. Shao, "Batch verifying multiple DSA-type digital signatures", Computer Networks, 2001.
  13. B. Tsaban, "Fast generators for the Diffie-Hellman key agreement protocol and malicious standards", Information Processing Letters, 2006.
  14. G. E. Moore, "Cramming More Components onto Integrated Circuits", Proceedings of the IEEE, 1998.
  15. "Moore's Law"- http://en. wikipedia. org
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Security goals Security threats