Information Encryption and Decryption Analysis, Vulnerabilities and Reliability Implementing the RSA Algorithm in Python']Python

被引:0
|
作者
Rodriguez G, Rocio [1 ]
Castang M, Gerardo [1 ]
Vanegas, Carlos A. [1 ]
机构
[1] Univ Dist Francisco Jose de Caldas, Fac Tecnol, Bogota, Colombia
来源
APPLIED INFORMATICS (ICAI 2021) | 2021年 / 1455卷
关键词
Encryption; Decryption; Security; Cryptography; RSA; Cryptanalysis;
D O I
10.1007/978-3-030-89654-6_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The processing and transmission of information has increased its effectiveness in recent decades. From mathematical models the security and integrity of the data are guaranteed. In spite of that, interceptions in the signal, attacks and information theft can happen in the transmission process. This paper presents a RSA algorithm analysis, using 4, 8 and 10 bits prime numbers with short messages. The encryption and decryption process implemented in python allowed the computational resources use. Processing time and data security are evaluated with a typical computational infrastructure required for its operation; in order to identify vulner-abilities and their reliability level when ideal conditions are available to perform a cryptanalysis.
引用
收藏
页码:391 / 404
页数:14
相关论文
共 13 条
  • [1] Implemetation of RSA Algorithm for Speech Data Encryption and Decryption
    Rahman, Md. Mijanur
    Saha, Tushar Kanti
    Bhuiyan, Md. Al-Amin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (03): : 74 - 82
  • [2] Encryption and Decryption Using RSA Algorithm and Moore-Penrose Inverse
    Gogoi, Sarbani
    Paul, Somnath
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON NETWORK SECURITY AND BLOCKCHAIN TECHNOLOGY, ICNSBT 2024, 2025, 1158 : 25 - 33
  • [3] Data Encryption and Decryption Using RSA Algorithm in a Network Environment
    Goshwe, Nentawe Y.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (07): : 9 - 13
  • [4] Encryption and decryption of signed graph matrices through RSA algorithm
    Wardak, Obaidullah
    Sinha, Deepa
    Sethi, Anshu
    INDIAN JOURNAL OF PURE & APPLIED MATHEMATICS, 2024, 55 (04) : 1477 - 1484
  • [5] Software Implementation of a Module for Encryption and Decryption Using the RSA Algorithm
    Borodzhieva, Adriana Naydenova
    2016 XXV INTERNATIONAL SCIENTIFIC CONFERENCE ELECTRONICS (ET), 2016,
  • [6] Data Encryption and Decryption Using RSA Algorithm in a Network Environment
    Goshwe, Nentawe Y.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (05): : 82 - 86
  • [7] Enhancement of Speech Encryption/Decryption Process Using RSA Algorithm Variants
    Abouelkheir, Eman
    El-Sherbiny, Shamia
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2022, 12
  • [8] Analysis of Encryption Algorithms (RSA, SRNN and 2 key pair) for Information Security
    Bonde, Sarika Y.
    Bhadade, U. S.
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [9] An Analysis of Encryption and Decryption Application by using One Time Pad Algorithm
    Zaeniah
    Purnama, Bambang Eka
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (09) : 292 - 297
  • [10] Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa & Aes) Encryption Algorithm
    Mahalle, Vishwanath S.
    Shahade, Aniket K.
    2014 INTERNATIONAL CONFERENCE ON POWER, AUTOMATION AND COMMUNICATION (INPAC), 2014, : 146 - 149