A New Variant of Subset-sum Cryptosystem over Rsa

نویسندگان

  • Sonal Sharma
  • Saroj Hiranwal
  • Prashant Sharma
چکیده

RSA is an algorithm for public-key cryptography that is based on the presumed difficulty of factoring large integers, the factoring problem. RSA stands for Ron Rivest, Adi Shamir and Leonard, who first publicly described it in 1978. A user of RSA creates and then publishes the product of two large prime numbers, along with an auxiliary value, as their public key. The prime factors must be kept secret. In RSA if one can factor modulus into its prime numbers then the private key is also detected and hence the security of the cryptosystem is broken. The Subset-Sum cryptosystem (Knapsack Cryptosystem) is also an asymmetric cryptographic technique. The Merkle-Hellman system is based on the subset sum problem (a special case of the knapsack problem): An instance of the Subset Sum problem is a pair (S, t), where S = {x1 , x2 , ..., xn} is a set of positive integers and t (the target) is a positive integer. The decision problem asks for a subset of S whose sum is as large as possible, but not larger than t. This problem is NP-complete. However, if the set of numbers (called the knapsack) is super increasing, that is, each element of the set is greater than the sum of all the numbers before it; the problem is easy and solvable in polynomial time with a simple greedy algorithm. So in this paper we present a new algorithm (Modified Subset-Sum cryptosystem over RSA) which is secure against Mathematical attack, Brute-force attack, Factorization attack and Chosen-cipher-text attack on RSA as well as Shamir attacks. This paper also presents comparison between Modified Subset Sum Cryptosystem and RSA cryptosystems in respect of security and performance.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhancement over the Variant of Public Key Cryptography (PKC) Algorithm

In this paper, we have shown the development of a new public key cryptosystem which is the extension of the work of “Improvement over three prime RSA with two private keys and one public key”. In many cases, the decryption generation speed is required to be enhanced,e.g; in banking sector, signature generation in one day can be in a large volume as compared to only single signature verification...

متن کامل

Short-Exponent RSA

In some applications, a short private exponent d is chosen to improve the decryption or signing process for RSA public key cryptosystem. However, in a typical RSA, if the private exponent d is selected first, the public exponent e should be of the same order of magnitude as φ(N). Sun et al. devised three RSA variants using unbalanced prime factors p and q to lower the computational cost. Unfort...

متن کامل

On DRSA Public Key Cryptosystem

The standard RSA cryptosystem is not semantically secure. Pointcheviel proposed a variant of RSA cryptosystem with the property of semantic security by introducing a new problem known as DRSA problem. He called it DRSA scheme. In this paper, we underlined a shortcoming of that scheme and proposed an alternative DRSA public key cryptosystem.

متن کامل

USENIX Association Proceedings of the 10 th USENIX Security Symposium

We present a new approach to fast certi cate revocation centered around the concept of an on-line semi-trusted mediator (SEM). The use of a SEM in conjunction with a simple threshold variant of the RSA cryptosystem (mediated RSA) o ers a number of practical advantages over current revocation techniques. Our approach simpli es validation of digital signatures and enables certi cate revocation wi...

متن کامل

An Efficient Variant of RSA Cryptosystem

An efficient variant of RSA cryptosystem was proposed by Cesar [2]. He called it Rprime RSA. The Rprime RSA is a combination of Mprime RSA [3] and Rebalanced RSA [9, 1]. Although the decryption speed of Rprime RSA is 27 times faster than the standard RSA and 8 times faster than the QC RSA [6] in theoretically, yet due to the large encryption exponent, the encryption process becomes slower than ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011