Study A Public Key in RSA Algorithm

##plugins.themes.bootstrap3.article.main##

  •   Taleb Samad Obaid

Abstract

To transmit sensitive information over the unsafe communication network like the internet network, the security is precarious tasks to protect this information. Always, we have much doubt that there are more chances to uncover the information that is being sent through network terminals or the internet by professional/amateur parasitical persons. To protect our information we may need a secure way to safeguard our transferred information. So, encryption/decryption, stenographic and vital cryptography may be adapted to care for the required important information. In system cryptography, the information transferred between both sides sender/receiver in the network must be scrambled using the encryption algorithm. The second side (receiver) should be outlook the original data using the decryption algorithms. Some encryption techniques applied the only one key in the cooperation of encryption and decryption algorithms. When the similar key used in both proceeds is called symmetric algorithm. Other techniques may use two different keys in encryption/decryption in transferring information which is known as the asymmetric key.  In general, the algorithms that implicated asymmetric keys are much more secure than others using one key.   RSA algorithm used asymmetric keys; one of them for encryption the message, and is known as a public key and another used to decrypt the encrypted message and is called a private key. The main disadvantage of the RSA algorithm is that extra time is taken to perform the encryption process. In this study, the MATLAB library functions are implemented to achieve the work. The software helps us to hold very big prime numbers to generate the required keys which enhanced the security of transmitted information and we expected to be difficult for a hacker to interfere with the private information. The algorithms are implemented successfully on different sizes of messages files.


Keywords: Cryptography, Ciphertext, Data Security, RSA Algorithm, Key Generation

References

Meneses F., Fuertes W., José Sancho, Salvador S., Flores D., Aules H., Castro F. Torres J., Miranda A., Nuela D., (2016), “RSA Encryption Algorithm Optimization to Improve Performance and Security Level of Network Messages”, IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.8.

Jamgekar R. S., Joshi G.S., (2013), “File Encryption and Decryption Using Secure RSA,” International Journal of Emerging Science and Engineering (IJESE), ISSN: 2319–6378, Volume-1, Issue-4,

Obaid T. A. S. Khami M. Shehab L. G. (2017), “Hiding Secured key in digital media”, Int. Jo. Eng. Res. App., ISSN: 2248-9622, Vol. 7, Issue 9, pp.58-63, www.ijera.com

Nisha S., and Farik M., (2017), " RSA Public Key Cryptography Algorithm – A Review", International Journal of Scientific & Technology Research Volume 6, Issue 07, ISSN 2277-8616.

Khyoon, A. I. (2005) “Modification on the Algorithm of RSA Cryptography System,” Al-Fatih Journal, ISSN: 87521996, Volume: 1 Issue: 24 Pages: 80-89.

Al-Lehiebe A., (2015), " Ciphered Text Hiding in an Image using RSA algorithm", J. Of College of Education for Women vol. 26 (3).

Cid C., (2019), " Cryptanalysis of RSA: A Survey", SANS Institute.Bonde S. Y.; Bhadade U.S., (2017) International Conference on Computing, Communication, Control and Automation (ICCUBEA)”, DOI: 10.1109/ICCUBEA .8463720, Publisher: IEEE.

Patel S. R., Shah K., Patel G. R., (2013), “Study on Improvements in RSA Algorithm,” IJEDR, ISSN: 2321-9939.

Milanov E., (2009), “The RSA Algorithm” https://sites.math. washington. edu/~morrow/336_09/ papers/Yevgeny.pdf.

Kumar Y., Munjal R., Sharma H, (2011), “Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures,” Int. J. Comp. Sci. and Management Studies, Vol. 11, Issue 03, ISSN: 2231-5268, www.ijcsms.com.

Choudhary V., Praveen N. “Enhanced Rsa Cryptosystem Based On Three Prime Numbers,” Int. J. Innov. Sc., Eng. & Tech., Vol. 1, Issue 10, 2014. www.ijiset.com.

Intila C. Gerardo B. Medina R., (2019) “A study of public key ‘e’ in RSA algorithm,” The International Conference on Information Technology and Digital Applications, IOP Conf. Series: Materials Science and Engineering 482 012016, IOP Publishing, DOI:10.1088/1757-899X/482/1/012016.

Kumar M. (2018), “Advanced RSA Cryptographic Algorithm for Improving Data Security” https://www.researchgate. net/publication/324812723, DOI: 10.1007/978-981-10-8536-9_2.

Thaku P., Rana A., (2016), "A Symmetrical Key Cryptography Analysis using Blowfish Algorithm", International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 5 Issue 07.

Choudhary V. and. Praveen N., (2014), "Enhanced RSA Cryptosystem Based On Three Prime Numbers", IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 10, www.ijiset.com.

Abdeldaym R. S., Abd Elkader H. M., Hussein R., (2019), " Modified RSA Algorithm Using Two Public Key and Chinese Remainder Theorem", I.J. of Electronics and Information Engineering, Vol.10, No.1, PP.51-64, (DOI: 10.6636/IJEIE.201903 10(1).06) 51.

Ch. J. L. Padmaja Ch. J. L., Bhagavan V. S., and Srinivas B., (2016), " RSA Encryption Using Three Mersenne Primes", Int. J. Chem. Sci.: 14(4), 2273-2278, ISSN 0972-768X, www.sad gurupublications.com.

Nisha S., and Farik M., (2017), " RSA Public Key Cryptography Algorithm – A Review", International Journal of Scientific & Technology Research Volume 6, Issue 07, ISSN 2277-8616.

Meneses F., Fuertes W, José S., Santiago Salvador, Daniela Flores, (2016), " RSA Encryption Algorithm Optimization to Improve Performance and Security Level of Network Messages", IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.8, 55.

Thangav M., Varalakshmi P., Murral M., Nithya K., (2015), " An Enhanced and Secured RSA Key Generation Scheme (ESRKGS)", Journal of Information Security and Applications, Volume 20, Pages 3-10.

Intila C., Gerardo B., Medina R., (2019), " A study of public key ‘e’ in RSA algorithm", The International Conference on Information Technology and Digital Applications, IOP Conf. Series: Materials Science and Engineering 482. 012016, IOP Publishing, DOI:10.1088/1757-899X/482/1/012016.

Uthman S., (2017), " An Improved RSA based on Double Even Magic Square of order 32 ", Kirkuk University Journal /Scientific Studies (KUJSS), Volume 12, Issue 4, ISSN 1992 – 0849.

Downloads

Download data is not yet available.

##plugins.themes.bootstrap3.article.details##

How to Cite
[1]
Obaid, T. 2020. Study A Public Key in RSA Algorithm. European Journal of Engineering and Technology Research. 5, 4 (Apr. 2020), 395-398. DOI:https://doi.org/10.24018/ejers.2020.5.4.1843.