ACAFP: Asymmetric Key based Cryptographic Algorithm using Four Prime Numbers to Secure Message Communication. A Review on RSA Algorithm

被引:0
|
作者
Chaudhury, Punit [1 ]
Dhang, Susmita [1 ]
Roy, Monpreet [1 ]
Deb, Saurav [1 ]
Saha, Jyotirmoy [1 ]
Mallik, Aditya [1 ]
Bal, Sauvik [1 ]
Roy, Saraswata [1 ]
Sarkar, Mrinal Kanti [1 ]
Kumar, Sanjay [2 ]
Das, Rupayan [1 ]
机构
[1] UEM, Dept CSE, Jaipur, Rajasthan, India
[2] JNU Jaipur, Dept CSE, Jaipur, Rajasthan, India
来源
2017 8TH ANNUAL INDUSTRIAL AUTOMATION AND ELECTROMECHANICAL ENGINEERING CONFERENCE (IEMECON) | 2017年
关键词
Cryptography; Encryption; Decryption; Cipher; Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RSA algorithm is used to hide and retrieve the data in an insecure network environment. The advantage of RSA algorithm is to increase security and accessibility. The private keys never required to be transferred or exposed to everybody. In a shared-key cryptographic system, the secret keys must be shared since exactly the same key is used for encryption and decryption. So there may be a chance that an intruder can find the secret key during the data transmission. There are so many limitations present in RSA algorithm. Various types of attack may be happen in RSA algorithm, like forward search attack, common modulus attack etc. Another disadvantage of using RSA cryptography for encryption is factorization problem and computation speed. In this paper we use a modified RSA cryptosystem algorithm called "Asymmetric key based Cryptographic Algorithm using Four Prime numbers to secure message communication (ACAFP)" to handle four prime numbers and provide security. Four prime numbers are not easily disintegrated and increased the effectiveness throughout the networks.
引用
收藏
页码:332 / 337
页数:6
相关论文
共 11 条
  • [1] Generalized RSA using 2k prime numbers with secure key generation
    Lone, Auqib Hamid
    Khalique, Aqeel
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4443 - 4450
  • [2] Image Steganography using RSA Algorithm for Secure Communication
    Preksha, B.
    Harish, Rishika
    Sreenivas, B.
    Vasanthalakshmi, M.
    2021 IEEE INTERNATIONAL CONFERENCE ON MOBILE NETWORKS AND WIRELESS COMMUNICATIONS (ICMNWC), 2021,
  • [3] An Enhanced Parallel Version of RSA Public Key Crypto Based Algorithm Using OpenMP
    Saxena, Rahul
    Jain, Monika
    Singh, Dushyant
    Kushwah, Ashutosh
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 37 - 42
  • [4] Design of a Secure Chat Application based on AES Cryptographic Algorithm and Key Management
    Bardis, Nikolaos G.
    Ntaikos, Konstantinos
    MATHEMATICAL METHODS, COMPUTATIONAL TECHNIQUES, NON-LINEAR SYSTEMS, INTELLIGENT SYSTEMS, 2008, : 486 - +
  • [5] Secure Communication of IoT based Devices using EPEB Algorithm
    Afzal, Adil
    Khan, Muhammad Adnan
    Abbas, Sagheer
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2018, 13 (03): : 91 - 97
  • [6] String Graphixification Based Asymmetric Key Cryptographic Algorithm Using Proposed Concepts of GDC and S-Loop Matrix
    Chowdhury, Rajdeep
    Ghosh, Saikat
    De, Mallika
    2012 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2012, : 1152 - 1157
  • [7] Encryption implementation based on symmetric algorithm using a key rounds upto four rounds
    Abdelwahab, Murtada. M.
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, CONTROL, NETWORKING, ELECTRONICS AND EMBEDDED SYSTEMS ENGINEERING (ICCNEEE), 2015, : 27 - 31
  • [8] An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the RSA Public-Key Cryptosystem
    Ye, Guodong
    Jiao, Kaixin
    Wu, Huishan
    Pan, Chen
    Huang, Xiaoling
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2020, 30 (15):
  • [9] Secure Image Transcoding technique using chaotic key based algorithm with improved security
    Anoop, B. N.
    George, Sudhish N.
    Deepthi, P. P.
    2013 IEEE INTERNATIONAL MULTI CONFERENCE ON AUTOMATION, COMPUTING, COMMUNICATION, CONTROL AND COMPRESSED SENSING (IMAC4S), 2013, : 693 - 697
  • [10] Secure data hiding scheme using shape generation algorithm: a key based approach
    Yadav, Gyan Singh
    Ojha, Aparajita
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (13) : 16319 - 16345