An optimised homomorphic CRT-RSA algorithm for secure and efficient communication

被引:17
|
作者
Abid R. [1 ]
Iwendi C. [2 ]
Javed A.R. [3 ]
Rizwan M. [1 ]
Jalil Z. [3 ]
Anajemba J.H. [4 ]
Biamba C. [5 ]
机构
[1] Department of Computer Science Kinnaird College for Women, University Lahore, Lahore
[2] School of Creative Technologies, University of Bolton, A676 Deane Rd, Bolton
[3] Department of Cyber Security, Air University, Islamabad
[4] Department of Communication Engineering, Hohai University, Changzhou
[5] Department of Educational Sciences Faculty of Education and Business Studies, University of Gävle, Gävle
关键词
CRT; Fast communication; Homomorphic encryption; RSA; Security;
D O I
10.1007/s00779-021-01607-3
中图分类号
学科分类号
摘要
Secure and reliable exchange of information between devices is crucial for any network in the current digital world. This information is maintained on storage devices, routing devices, and communication over the cloud. Cryptographic techniques are used to ensure the secure transmission of data, ensuring the user’s privacy by storing and transmitting data in a particular format. Using encryption, only the intended user possessing the key can access the information. During data or essential transmission, the channel should be secured by using robust encryption techniques. Homomorphic Encryption (HE) techniques have been used in the past for this purpose. However, one of the flaws of the conventional HE is seen either in its slow transmission or fast key decryption. Thus, this paper proposes an optimized Homomorphic Encryption Chinese Remainder Theorem with a Rivest-Shamir-Adleman (HE-CRT-RSA) algorithm to overcome this challenge. The proposed Technique, HE-CRT-RSA, utilizes multiple keys for efficient communication and security. In addition, the performance of the HE-CRT-RSA algorithm was evaluated in comparison with the classical RSA algorithm. The result of the proposed algorithm shows performance improvement with reduced decryption time. It is observed that the proposed HE-CRT-RSA is 3–4% faster than the classical Rivest-Shamir-Adleman (RSA). The result also suggests that HE-CRT-RSA effectively enhances security issues of the cloud and helps to decrease the involvement of intruders or any third party during communication or inside the data/server centers. © 2021, The Author(s).
引用
收藏
页码:1405 / 1418
页数:13
相关论文
共 50 条
  • [1] A CRT-RSA algorithm secure against hardware fault attacks
    Liu, Sining
    King, Brian
    Wang, Wei
    DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 51 - +
  • [2] Efficient CRT-RSA Decryption for Small Encryption Exponents
    Maitra, Subhamoy
    Sarkar, Santanu
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 26 - 40
  • [3] Partial Key Exposure Attack on CRT-RSA
    Sarkar, Santanu
    Maitra, Subhamoy
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 473 - 484
  • [4] A secured modular exponentiation for rsa and crt-rsa with dual blinding to resist power analysis attacks
    Mahanta H.J.
    Khan A.K.
    International Journal of Information and Computer Security, 2020, 12 (2-3) : 112 - 129
  • [5] Faster CRT-RSA decryption towards RFID applications
    Maitra S.
    Sarkar S.
    Chowdhury M.U.
    Cryptology and Information Security Series, 2010, 4 : 61 - 72
  • [6] New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents
    Lu, Yao
    Zhang, Rui
    Lin, Dongdai
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 151 - 162
  • [7] Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents
    Sarkar, Santanu
    Maitra, Subhamoy
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 476 - 493
  • [8] CRT RSA algorithm protected against fault attacks
    Boscher, Arnaud
    Naciri, Robert
    Prouff, Emmanuel
    INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 229 - +
  • [9] THE MODIFICATION OF RSA ALGORITHM TO ADAPT FULLY HOMOMORPHIC ENCRYPTION ALGORITHM IN CLOUD COMPUTING
    Sha, Peidong
    Zhu, Zhixiang
    PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 388 - 392
  • [10] An efficient low complexity compression based optimal homomorphic encryption for secure fiber optic communication
    Venu, D.
    Mayuri, A. V. R.
    Neelakandan, S.
    Murthy, G. L. N.
    Arulkumar, N.
    Shelke, Nilesh
    OPTIK, 2022, 252