Information Encryption and Decryption Analysis, Vulnerabilities and Reliability Implementing the RSA Algorithm in Python']Python

被引:0
作者
Rodriguez G, Rocio [1 ]
Castang M, Gerardo [1 ]
Vanegas, Carlos A. [1 ]
机构
[1] Univ Dist Francisco Jose de Caldas, Fac Tecnol, Bogota, Colombia
来源
APPLIED INFORMATICS (ICAI 2021) | 2021年 / 1455卷
关键词
Encryption; Decryption; Security; Cryptography; RSA; Cryptanalysis;
D O I
10.1007/978-3-030-89654-6_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The processing and transmission of information has increased its effectiveness in recent decades. From mathematical models the security and integrity of the data are guaranteed. In spite of that, interceptions in the signal, attacks and information theft can happen in the transmission process. This paper presents a RSA algorithm analysis, using 4, 8 and 10 bits prime numbers with short messages. The encryption and decryption process implemented in python allowed the computational resources use. Processing time and data security are evaluated with a typical computational infrastructure required for its operation; in order to identify vulner-abilities and their reliability level when ideal conditions are available to perform a cryptanalysis.
引用
收藏
页码:391 / 404
页数:14
相关论文
共 15 条
[1]  
Asjad S, 2019, RSA ALGORITHM, P5
[2]  
Bokhari M., 2014, CRYPTANALYSIS TOOLS
[3]  
Castro Lechtaler A., 2021, 21 WORKSHOP INVESTIG
[4]  
Fonseca-Herrera O.A., IAENG INT J COMPUT S, V48
[5]  
Gabriel E.M, 2011, CLUSTER ALTO RENDIMI, P60
[6]  
Goldreich O, 2000, MODERN CRYPTOGRAPHY, VSecond Edition, P1
[7]  
Mateti P., 2007, SECURITY DISTRIBUTED, P3
[8]  
Obaida M.A. A., 2013, International Journal of Computer Networks Communications, V5, P95, DOI DOI 10.5121/IJCNC.2013.5208
[9]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI [10.1145/359340.359342, 10.1145/357980.358017]
[10]  
Rodriguez G.R., 2020, PYTHON ALCANCE, P100