An efficient RSA public key encryption scheme

被引:17
作者
Aboud, Sattar J. [1 ]
AL-Fayoumi, Mohammad A. [1 ]
Al-Fayoumi, Mustafa [2 ]
Jabbar, Haidar S. [3 ]
机构
[1] Middle E Tech Univ, Grad Stud Fac IT, Amman, Jordan
[2] Anglia Ruskin Univ, Fac Sci & Technol, Cambridge, England
[3] Anna Univ, Dept Comp Sci & Engn, Madras 600025, Tamil Nadu, India
来源
PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS | 2008年
关键词
RSA public encryption scheme; square matrices; general linear group; digital signature scheme;
D O I
10.1109/ITNG.2008.199
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an efficient RSA public key encryption scheme, which is an improved version of original RSA scheme. The proposed RSA encryption scheme is based on linear group over the ring of integer mod a composite modulus n which is the product of two distinct prime numbers. In the proposed scheme the original message and the encrypted message are h x h square matrices with entities in z(n) indicated via l(h,z(n)). Since the original RSA Scheme is a block cipher in which the original message and cipher message are integer in the interval [0,n-1] for solve integer modulus n. Therefore, in this paper, we generalize RSA encryption scheme in order to be implemented in the general linear group on the ring of integer mod n. Furthermore, the suggested encryption scheme has no restriction in encryption and decryption order and is claimed to be efficient, scalable and dynamic.
引用
收藏
页码:127 / +
页数:3
相关论文
共 11 条
[1]   Baghdad method for calculating multiplicative inverse [J].
Aboud, SJ .
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, :816-819
[2]  
Bruce S., 1996, APPL CRYPTOGRAPHY
[3]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[4]  
DOUGLAS R, 2006, CRYPTOGRAPHY THEORY, P211
[5]   EFFICIENCY OF SS(I) SQUARE-AND-MULTIPLY EXPONENTIATION ALGORITHMS [J].
LAM, KY ;
HUI, LCK .
ELECTRONICS LETTERS, 1994, 30 (25) :2115-2116
[6]  
Okamoto T, 1998, LECT NOTES COMPUT SC, V1403, P308, DOI 10.1007/BFb0054135
[7]  
Padhye S, 2006, INT ARAB J INF TECHN, V3, P334
[8]  
Pointcheval D, 1999, LECT NOTES COMPUT SC, V1592, P239
[9]  
Rabin M.O., 1979, Technical Report
[10]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017