Modified RSA-based algorithm: a double secure approach
نویسندگان
چکیده
منابع مشابه
Secure Digital Certificate Design Based on the RSA Algorithm
With the popularity of the Internet, people can purchase and sell goods and services online just staying at home, and this trend is becoming increasingly apparent. The Internet, as a global computer network, has to provide the following five services: security, data integrity, authentication, usability, and reliable information. In case of lack of safety measures, Internet trading risk is very ...
متن کاملModified RSA Algorithm with CRT & OAEP
The most active subjects in the security related communities are the necessary protection against the data thieves. This gives an importance and the value of exchanged data over the Internet or other media types. In many RSA cryptosystems, we usually select a small value for the public key e. This kind of choice can only speed up the encryption operation but do not forget that by this way, the ...
متن کاملWagner's Attack on a Secure CRT-RSA Algorithm Reconsidered
At CCS 2003, a new CRT-RSA algorithm was presented in [BOS03], which was claimed to be secure against fault attacks for various fault models. At CCS 2004, David Wagner presented an attack on the proposed scheme, claiming that the so-called BOS scheme was insecure for all presented fault models [Wag04]. However, the attack itself contains a flaw which shows that although the BOS scheme is broken...
متن کاملA Modified Variant of RSA Algorithm for Gaussian Integers
Received Jun 15 th , 2013 Revised Jun 30 th , 2013 Accepted Jul 28 th , 2013 In this paper, we propose a modified RSA variant using the domain of Gaussian integers providing more security as compare to the old one. The proposed varaint has significant specifics: the encryption is substantially faster than the decryption. There are certain settings where the sender has limited time to transmit t...
متن کاملA Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique
Steganography is a method of hiding secret messages in a cover object while communication takes place between sender and receiver. Security of confidential information has always been a major issue from the past times to the present time. It has always been the interested topic for researchers to develop secure techniques to send data without revealing it to anyone other than the receiver. Ther...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: TELKOMNIKA (Telecommunication Computing Electronics and Control)
سال: 2019
ISSN: 2302-9293,1693-6930
DOI: 10.12928/telkomnika.v17i6.13201