CFP last date
20 January 2025
Reseach Article

RSA Public Key Cryptosystem using Modular Multiplication

by G. A. V. Rama Chandra Rao, P. V. Lakshmi, N. Ravi Shankar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 5
Year of Publication: 2013
Authors: G. A. V. Rama Chandra Rao, P. V. Lakshmi, N. Ravi Shankar
10.5120/13860-1707

G. A. V. Rama Chandra Rao, P. V. Lakshmi, N. Ravi Shankar . RSA Public Key Cryptosystem using Modular Multiplication. International Journal of Computer Applications. 80, 5 ( October 2013), 38-42. DOI=10.5120/13860-1707

@article{ 10.5120/13860-1707,
author = { G. A. V. Rama Chandra Rao, P. V. Lakshmi, N. Ravi Shankar },
title = { RSA Public Key Cryptosystem using Modular Multiplication },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 5 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 38-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number5/13860-1707/ },
doi = { 10.5120/13860-1707 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:53:46.345304+05:30
%A G. A. V. Rama Chandra Rao
%A P. V. Lakshmi
%A N. Ravi Shankar
%T RSA Public Key Cryptosystem using Modular Multiplication
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 5
%P 38-42
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the rapid development of contemporary information technology, security has become important technique in many applications including Virtual Private Network (VPN), electronic commerce ,secure internet access etc. The security of public key encryption such as RSA scheme relied on the integer factorization problem. The security of RSA algorithm is based on a positive integer n, because each transmitting node generates pair of keys such as public and private. Encryption and decryption of any message depends on positive integer n. Where, the positive integer n is the product of two prime numbers and pair of key generation is depend on these prime numbers. In the paper [11], an algorithm for modular multiplication for public key cryptosystem is presented. This method is based on the following two ideas: (i) The remainder in regard to n can be constructed from the remainder with modulus (2n+1) and the remainder with modulus (2n+2). (ii) It often happens that 2n+1can easily be factorized, even if n is a prime number or n is difficult to be factorized into prime factors. The changed modulus value will be stated, which might be the one of the modulus factor i. e. , (2n+1). Even if the hacker factorizes this new modulus value, they can't be searched out the original decryption key (d). Incapability to find the original decryption key, the factorization is insignificant. This proposed method helps to overcome the weakness of factorization found in RSA.

References
  1. R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," vol. 21 (2), pp. 120-126, 1978. .
  2. S. Robinson,"Still Guarding Secrets after Years of Attacks, RSA Earns Accolades for its Founders," SIAM News, Vol. 36, Number 5, June 2003.
  3. M. Frunza,and L. Scripcariu ,"Improved RSA Encryption Algorithm for increased Security of Wireless Networks" Signals, Circuits and Systems,2007,ISSCS 2007, International Symposiumon. Vol. 2. IEEE,2007
  4. D. Lerch Hostalot, "Factorization attack on RSA," hakin9 3/2007. www. en. hackin9. org
  5. Al Hasib, Abdullah, and Abul Ahsan Md Mahmudul Haque. "A comparative study of the performance and security issues of AES and RSA cryptography. " Convergence and Hybrid Information Technology, 2008. ICCIT'08. Third International Conference on. Vol. 2. IEEE, 2008.
  6. J. M. Jordan, and P. J. Flinn, "Using the RSA Algorithm for Encryption and Digital Signatures," July 9, 1997.
  7. Fahn, R. , and M. J. B. Robshaw. Results from the RSA Factoring Challenge. Technical Report TR-501, Version 1. 3, RSA Laboratories, 1995.
  8. Hwang, R. J. , Su, F. F. , Yeh, Y. S. , & Chen, C. Y. (2005, March). An efficient decryption method for RSA cryptosystem. In Advanced Information Networking and Applications, 2005. AINA 2005. 19th International Conference on (Vol. 1, pp. 585-590). IEEE.
  9. B. Schneier "Applied cryptography protocol, algorithms, and source code in C" 2ndedition, John Wiley&sons,Inc,1996.
  10. Koblitz, Neal. "Elliptic curve cryptography. " Mathematics of Computation 48,177 (1987).
  11. Rao, GAV Rama Chandra, P. V. Lakshmi, and N. Ravi Shankar. "A New Modular Multiplication Method in Public Key Cryptosystem. " International Journal of Network Security 15. 1 (2013): 23-27.
  12. Rao, GAV Rama Chandra, P. V. Lakshmi, and N. Ravi Shankar, "A Novel Modular Multiplication Algorithm and its Application to RSA Decryption", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Pubic key cryptosystem modular multiplication RSA Cryptosystem modulus factor