Steganography Algorithm Based RSA Cryptosystem

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The RSA Cryptosystem: History, Algorithm, Primes

Ever since people began to write down events in their lives, there has been a need for cryptography. Cryptography is the encryption of text in such a manner that outsiders to the code cannot understand the code, but the desired reader is able to decrypt the encryption so as to understand the message. For early man, just as for modern man, there has always been a need for secrecy, because it is ...

متن کامل

Attack on RSA Cryptosystem

The RSA cryptosystem is most widely used cryptosystem it may be used to provide both secrecy and digital signatures and its security is based on the intractability of the integer factorization. The security of RSA algorithm depends on the ability of the hacker to factorize numbers. New, faster and better methods for factoring numbers are constantly being devised. The Trent best for long numbers...

متن کامل

Improvement in RSA Cryptosystem

Boneh and Shacham gave a nice survey on four variants (Batch RSA, MultiPrime RSA, MultiPower RSA, Rebalanced RSA). Rebalanced RSA and MultiPower RSA were then combined to increase the decryption/signature generation performance. This combination theoretically improves the decryption/signature generation time about 14 times than RSA with CRT and about 56 times than the standard RSA with key size...

متن کامل

The RSA Cryptosystem

This paper explores the history and mathematics be­ hind the RSA cryptosystem, including the idea of public key cryp­ tosystems and number theory. It outlines the applications of RSA including secure information transfers and electronic signatures. It also analyzes why RSA is a secure way of transmitting information and the ways that it has been defeated in the past. In particular, we focus on ...

متن کامل

High-Speed Modular Multiplication Algorithm for RSA Cryptosystem

Both encryption and decryption are modular exponentiation. Therefore, the fast modular exponentiation algorithm is required. For most hardware implementation, the simple square and multiply algorithm, often called binary method, is assumed to be the most effective because of the simple hardware structure and repetitive control. In the RL (Right-to-Left) binary method, n iterations are needed an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Engineering and Applied Sciences

سال: 2019

ISSN: 1816-949X

DOI: 10.36478/jeasci.2019.2240.2243