Development of Public Key Cryptosystem RSA via Multidimensional Algebra

被引:0
|
作者
Abo-Alsood, Hadeel Hadi [1 ]
Hamza, Mohammed Hassan [2 ]
Al-Bairmani, Sukaina Abdullah [3 ]
Yassein, Hassan Rashed [4 ]
机构
[1] Al Muthanna Univ, Dept Math, Collage Educ Pure Sci, Al Muthanna, Iraq
[2] Gen Directorate Al Muthanna Educ, Al Muthanna, Iraq
[3] Univ Babylon, Dept Math, Collage Basic Educ, Hillah, Iraq
[4] Univ Al Qadisiyah, Coll Educ, Dept Math, Al Qadisiyah, Iraq
关键词
RSA; HH-RSA; Space of key; NTRU; DESIGN;
D O I
暂无
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
When data is shared over the public Internet, there is a possibility that it can be hacked by hackers. To prevent this, cryptosystems can be used to ensure the secure transmission of this. In this paper, we introduce a new public key HH-RSA that is based on five-dimensions to get high security through key creation, encryption, and decryption.
引用
收藏
页码:1177 / 1182
页数:6
相关论文
共 50 条
  • [21] On the Fog of RSA Key Lengths Verifying Public Key Cryptography Strength Recommendations
    Kiviharju, Mikko
    2017 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2017,
  • [22] RSA SIGNATURE SCHEMES WITH SUBLIMINAL-FREE PUBLIC KEY
    Villanyi, Viktoria I.
    TATRACRYPT '07 - 7TH CENTRAL EUROPE CONFERENCE OF CRYPTOLOGY, 2008, 41 : 19 - 32
  • [23] Asymmetric public key cryptosystem using digital holographic encryption method
    Gil, Sang Keun
    Jeon, Seok Hee
    Jeong, Jong Rae
    Kim, Nam
    PRACTICAL HOLOGRAPHY XXXIV: DISPLAYS, MATERIALS, AND APPLICATIONS, 2020, 11306
  • [24] A non-associative lattice-based public key cryptosystem
    Malekian, Ehsan
    Zakerolhosseini, Ali
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (02) : 145 - 163
  • [25] Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem
    Lee, Mun-Kyu
    Song, Jeong Eun
    Choi, Dooho
    Han, Dong-Guk
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 153 - 163
  • [26] Concurrent factorization of RSA moduli via weak key equations
    Ruzai, Wan Nur Aqlili
    Ying, You
    Muhammad, Khairun Nisak
    Asbullah, Muhammad Asyraf
    Ariffin, Muhammad Rezal Kamel
    AIMS MATHEMATICS, 2024, 9 (10): : 28211 - 28231
  • [27] An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA
    Zhang, Chunfu
    Liang, Yanchun
    Tavares, Adriano
    Wang, Lidong
    Gomes, Tiago
    Pinto, Sandro
    SYMMETRY-BASEL, 2024, 16 (03):
  • [28] On the conventional public key in identification-based encryption: The case of RSA
    Aouinatou, Rkia
    Belkasmi, Mostafa
    International Journal of Information and Computer Security, 2013, 5 (03) : 171 - 201
  • [29] Magnifying the Key Stability of RSA Algorithm in Data Security for Public Cloud
    Kamal, M.
    Ravi, G.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 805 - 812
  • [30] Why one should also secure RSA public key elements
    Brier, Eric
    Chevallier-Mames, Benoit
    Ciet, Mathieu
    Clavier, Christophe
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 324 - 338