Encryption and Decryption through RSA Cryptosystem using Two Public Keys and Chinese Remainder Theorem

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem

The realization of the quantum computer will enable to break publickey cryptosystems based on factoring problem and discrete logarithm problem. It is considered that even the quantum computer can not solve NP -hard problem in a polynomial time. The subset sum problem is known to be NP -hard. Merkle and Hellman proposed a knapsack cryptosystem using the subset sum problem. However, it was broken...

متن کامل

To Design and Implement Novel Method of Encryption using Modified RSA and Chinese Remainder Theorem

Security can only be as strong as the weakest link. In this world of cryptography, it is now well established, that the weakest link lies in the implementation of cryptographic algorithms. This paper deals with RSA algorithm with and without Chinese Remainder Theorem. In practice, RSA public exponents are chosen to be small which makes encryption and signature verification reasonably fast. Priv...

متن کامل

VLSI Design of RSA Cryptosystem Based on the Chinese Remainder Theorem

This paper presents the design and implementation of a systolic RSA cryptosystem based on a modified Montgomery’s algorithm and the Chinese Remainder Theorem (CRT) technique. The CRT technique improves the throughput rate up to 4 times in the best case. The processing unit of the systolic array has 100% utilization because of the proposed block interleaving technique for multiplication and squa...

متن کامل

Generating RSA Encryption and Decryption Exponents

that is, d is e−1 (the inverse of e) in Zφ(n). We now turn to the question of how Alice chooses e and d to satisfy (1). One way she can do this is to choose a random integer e ∈ Zφ(n) and then solve (1) for d. We will show how to solve for d in Sections 46 and 47 below. However, there is another issue, namely, how does Alice find random e ∈ Zφ(n)? If Z ∗ φ(n) is large enough, then she can just ...

متن کامل

A Timing Attack against RSA with the Chinese Remainder Theorem

We introduce a new type of timing attack which enables the factorization of an RSA-modulus if the exponentiation with the secret exponent uses the Chinese Remainder Theorem and Montgomery’s algorithm. Its standard variant assumes that both exponentiations are carried out with a simple square and multiply algorithm. However, although its efficiency decreases, our attack can also be adapted to mo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2017

ISSN: 0975-8887

DOI: 10.5120/ijca2017914674